Managing Payment Transaction Costs
Amortized E-Cash
Offiine Micropayments without Trusted Hardware
Panel (I)
The Practical Problems of Implementing MicroMint
Protecting Digital Rights
Aspects of Digital Rights Management and the Use of Hardware Security
Devices
A Solution to the Napster Phenomenon: Why Value Cannot Be Created
Absent the Transfer of Subjective Data
Golden Times for Digital Rights Management?
Applicability of Public Key Cryptosystems to Digital Rights Management Applications
Trust and Risk Management
On the Global Content PMI: Improved Copy-Protected Internet Content
Distribution
Trust: A Collision of Paradigms
Groups and Anonymity
On the Security of Homage Group Authentication Protocol
Anonymity without 'Cryptography
Fair Tracing without Trustees
Invited Talk
Why the War on Money Laundering Should Be Aborted
Certificates and Authentication
Provably Secure Implicit Certificate Schemes
Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation
Mutual Authentication for Low-Power Mobile Devices Credit Card Security
Off-Line Generation of Limited-Use Credit Card Numbers
A Security Framework for Card-Based Systems
SecureClick: A Web Payment System with Disposable Credit Card Numbers
Panel (II)
The Business of Electronic Voting
Markets and Multiparty Computation
Privacy for the Stock Market
Secure Distributed Computing in a Commercial Environment
……
Singatures in Finantial Cryptography
Auctions
Author INdex