Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
39
views
7
references
Top references
cited by
10
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,094
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Financial Cryptography
How to make personalized web browsing simple, secure, and anonymous
other
Author(s):
Eran Gabber
,
Phillip B. Gibbons
,
Yossi Matias
,
Alain Mayer
Publication date
(Online):
July 19 2005
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Indonesia family life and health survey
Most cited references
7
Record
: found
Abstract
: not found
Book Chapter
: not found
Untraceable Electronic Cash
David Chaum
,
Amos Fiat
,
Moni Naor
(1990)
0
comments
Cited
65
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Untraceable Off-line Cash in Wallet with Observers
Stefan Brands
(1994)
0
comments
Cited
50
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Universal Electronic Cash
Tatsuaki Okamoto
,
Kazuo Ohta
(1992)
0
comments
Cited
20
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
1997
Publication date (Online):
July 19 2005
Pages
: 17-31
DOI:
10.1007/3-540-63594-7_64
SO-VID:
43ec12b9-b619-44b4-b363-f11dc121a443
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Anonymity control in E-cash systems
pp. 17
How to make personalized web browsing simple, secure, and anonymous
pp. 95
Electronic cash-technology will denationalise money
pp. 109
Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective
pp. 151
Auditable metering with lightweight security
pp. 307
Electronic lottery tickets as micropayments
Similar content
3,094
VisualiSAR: a Web-based application for clustering, structure browsing, and structure–activity relationship study
Authors:
David Wild
,
C.John Blankley
ANODR: Anonymous on Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks
Authors:
J Kong
,
X Hong
Performance and Security Analyses of Onion-Based Anonymous Routing for Delay Tolerant Networks
Authors:
Kazuya Sakai
,
Min-Te Sun
,
Wei-Shinn Ku
…
See all similar
Cited by
10
Optimistic Mixing for Exit-Polls
Authors:
Philippe Golle
,
Sheng Zhong
,
Dan Boneh
…
Usable Security: History, Themes, and Challenges
Authors:
Simson Garfinkel
,
Heather Richter Lipford
Low-cost and reliable mutual anonymity protocols in peer-to-peer networks
Authors:
Li Xiao
,
Zhichen Xu
,
Xiaodong Zhang
See all cited by