Search dblp for Publications

export results for "toc:db/reference/crc/fcs2010.bht:"

 download as .bib file

@book{DBLP:reference/crc/2010fcs,
  editor       = {Burton Rosenberg},
  title        = {Handbook of Financial Cryptography and Security},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823},
  doi          = {10.1201/9781420059823},
  isbn         = {978-1-4200-5981-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/2010fcs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Barni010,
  author       = {Mauro Barni and
                  Stefan Katzenbeisser},
  editor       = {Burton Rosenberg},
  title        = {Digital Watermarking},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {391--435},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c14},
  doi          = {10.1201/9781420059823-C14},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Barni010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Belenkiy10,
  author       = {Mira Belenkiy},
  editor       = {Burton Rosenberg},
  title        = {E-Cash},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {3--48},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c1},
  doi          = {10.1201/9781420059823-C1},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Belenkiy10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Brandt10,
  author       = {Felix Brandt},
  editor       = {Burton Rosenberg},
  title        = {Auctions},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {49--58},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c2},
  doi          = {10.1201/9781420059823-C2},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Brandt10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Coventry10,
  author       = {Lynne M. Coventry},
  editor       = {Burton Rosenberg},
  title        = {Human Factors},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {497--519},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c17},
  doi          = {10.1201/9781420059823-C17},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Coventry10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/DanezisDS10,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az and
                  Paul F. Syverson},
  editor       = {Burton Rosenberg},
  title        = {Anonymous Communication},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {341--389},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c13},
  doi          = {10.1201/9781420059823-C13},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/DanezisDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/DashtiM10,
  author       = {Mohammad Torabi Dashti and
                  Sjouke Mauw},
  editor       = {Burton Rosenberg},
  title        = {Fair Exchange},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {109--132},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c5},
  doi          = {10.1201/9781420059823-C5},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/DashtiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Ellison10,
  author       = {Carl M. Ellison},
  editor       = {Burton Rosenberg},
  title        = {Public Key Infrastructure},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {455--493},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c16},
  doi          = {10.1201/9781420059823-C16},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Ellison10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Jackson10,
  author       = {Margaret Jackson},
  editor       = {Burton Rosenberg},
  title        = {Legal Issues},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {521--554},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c18},
  doi          = {10.1201/9781420059823-C18},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Jackson10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/JakobssonSS10,
  author       = {Markus Jakobsson and
                  Sid Stamm and
                  Christopher Soghoian},
  editor       = {Burton Rosenberg},
  title        = {Phishing},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {301--339},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c12},
  doi          = {10.1201/9781420059823-C12},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/JakobssonSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Kiayias10,
  author       = {Aggelos Kiayias},
  editor       = {Burton Rosenberg},
  title        = {Electronic Voting},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {59--81},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c3},
  doi          = {10.1201/9781420059823-C3},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Kiayias10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Parhonyi10,
  author       = {R{\'{o}}bert P{\'{a}}rhonyi},
  editor       = {Burton Rosenberg},
  title        = {Micropayment Systems},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {163--191},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c7},
  doi          = {10.1201/9781420059823-C7},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Parhonyi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Pehlivanoglu10,
  author       = {Serdar Pehlivanoglu},
  editor       = {Burton Rosenberg},
  title        = {Broadcast and Content Distribution},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {133--159},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c6},
  doi          = {10.1201/9781420059823-C6},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Pehlivanoglu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/SadeghiW10,
  author       = {Ahmad{-}Reza Sadeghi and
                  Christian Wachsmann},
  editor       = {Burton Rosenberg},
  title        = {Trusted Computing},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {221--256},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c9},
  doi          = {10.1201/9781420059823-C9},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/SadeghiW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Safavi-NainiS10,
  author       = {Reihaneh Safavi{-}Naini and
                  Nicholas Paul Sheppard},
  editor       = {Burton Rosenberg},
  title        = {Digital Rights Management},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {193--220},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c8},
  doi          = {10.1201/9781420059823-C8},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Safavi-NainiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/SionW10,
  author       = {Radu Sion and
                  Marianne Winslett},
  editor       = {Burton Rosenberg},
  title        = {Regulatory Compliance},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {555--584},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c19},
  doi          = {10.1201/9781420059823-C19},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/SionW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Smith10,
  author       = {Sean Smith},
  editor       = {Burton Rosenberg},
  title        = {Hardware Security Modules},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {257--278},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c10},
  doi          = {10.1201/9781420059823-C10},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Smith10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Szydlo10,
  author       = {Michael Szydlo},
  editor       = {Burton Rosenberg},
  title        = {Portfolio Trading},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {279--297},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c11},
  doi          = {10.1201/9781420059823-C11},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Szydlo10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Wilton10,
  author       = {Robin Wilton},
  editor       = {Burton Rosenberg},
  title        = {Identity Management},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {437--453},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c15},
  doi          = {10.1201/9781420059823-C15},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Wilton10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Zhou10,
  author       = {Jianying Zhou},
  editor       = {Burton Rosenberg},
  title        = {Non-Repudiation},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {83--108},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c4},
  doi          = {10.1201/9781420059823-C4},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/crc/Zhou10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}