메뉴 건너뛰기




Volumn 1, Issue 2, 1996, Pages

Trust in electronic markets: The convergence of cryptographers and economists

Author keywords

[No Author keywords available]

Indexed keywords


EID: 53249136529     PISSN: 13960466     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (14)

References (122)
  • 1
    • 0011716149 scopus 로고    scopus 로고
    • Trust in a cryptographic economy and digital security deposits: Protocols and policies
    • Massachusetts Institute of Technology
    • Joseph M. Reagle Jr., 1996. "Trust in a cryptographic economy and digital security deposits: Protocols and policies," Master of Science in Technology and Policy Thesis, Massachusetts Institute of Technology, http://rpcp.mit.edu/∼reagle/commerce/commerce.html
    • (1996) Master of Science in Technology and Policy Thesis
    • Reagle Jr., J.M.1
  • 5
    • 0002863367 scopus 로고
    • Valuation of trust in open networks
    • Proceedings of the European Symposium on Research in Computer Security (ESORICS)
    • T. Beth, M. Borcherding, and B. Klein, 1994. "Valuation of trust in open networks," Proceedings of the European Symposium on Research in Computer Security (ESORICS), vol. LNCS 875, pp. 3-18;
    • (1994) LNCS , vol.875 , pp. 3-18
    • Beth, T.1    Borcherding, M.2    Klein, B.3
  • 9
    • 33751505476 scopus 로고
    • Crypto + Economics + AI = Digital Money Economies
    • The Cypherpunks list is archives
    • T. C. May, 1995. "Crypto + Economics + AI = Digital Money Economies," Cypherpunks. The Cypherpunks list is archives at http://www.hks.net/cpunks/index.html
    • (1995) Cypherpunks
    • May, T.C.1
  • 13
    • 0027266208 scopus 로고
    • Trust relationships in secure systems - A Distributed authentication perspective
    • R. Yahalom, B. Klein, and T. Beth, 1993. "Trust relationships in secure systems - A Distributed authentication perspective," Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, p. 152. In this paper, the authors provide an interesting table of functions for which principles are often trusted to do: identification, key generation, escrow, non-interference, clock synchronization, protocol compliance, and providing information about others' trustworthiness or reputation.
    • (1993) Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy , pp. 152
    • Yahalom, R.1    Klein, B.2    Beth, T.3
  • 15
    • 0002863367 scopus 로고
    • Valuation of trust in open networks
    • Proceedings of the European Symposium on Research in Computer Security (ESORICS)
    • T. Beth, M. Borcherding, and B. Klein, 1994. "Valuation of trust in open networks," Proceedings of the European Symposium on Research in Computer Security (ESORICS), vol. LNCS 875, p. 3.
    • (1994) LNCS , vol.875 , pp. 3
    • Beth, T.1    Borcherding, M.2    Klein, B.3
  • 16
    • 0002863367 scopus 로고
    • Valuation of trust in open networks
    • Proceedings of the European Symposium on Research in Computer Security (ESORICS)
    • T. Beth, M. Borcherding, and B. Klein, 1994. "Valuation of trust in open networks," Proceedings of the European Symposium on Research in Computer Security (ESORICS), vol. LNCS 875, p. 5. The interesting constraint of this analysis is that any negative experience destroys any direct trust relationship.
    • (1994) LNCS , vol.875 , pp. 5
    • Beth, T.1    Borcherding, M.2    Klein, B.3
  • 17
    • 0002863367 scopus 로고
    • Valuation of trust in open networks
    • T. Beth, M. Borcherding, and B. Klein, 1994. "Valuation of trust in open networks," LNCS 875, p. 5. Op. cit.
    • (1994) LNCS , vol.875 , pp. 5
    • Beth, T.1    Borcherding, M.2    Klein, B.3
  • 18
    • 0002863367 scopus 로고
    • Valuation of trust in open networks
    • Proceedings of the European Symposium on Research in Computer Security (ESORICS)
    • T. Beth, M. Borcherding, and B. Klein, 1994. "Valuation of trust in open networks," Proceedings of the European Symposium on Research in Computer Security (ESORICS), vol. LNCS 875, pp. 3-18.
    • (1994) LNCS , vol.875 , pp. 3-18
    • Beth, T.1    Borcherding, M.2    Klein, B.3
  • 19
    • 53349155300 scopus 로고    scopus 로고
    • note
    • The term trust is often used in two contrary ways which can be confusing. On one hand, "I don't trust that person," means one has a low expectation of individual assertions being true, and the consequent risk is higher. Risk is the inverse of trust. There is also the concept of, "the less risk there is, the less I need to trust the person." Trust and risk are related linearly. However, the second statement is speaking about the need of trust to overcome some amount of risk. Rather than this being the expectation of an assertion being true, one is expressing the existence of risk (or variance in one's expectation) but that one will act upon the assertion regardless. For most of this paper, I will use "trust" in the first sense.
  • 20
    • 53349131476 scopus 로고
    • Choice under uncertainty
    • Chapter 5 of Englewood Cliffs, N. J.: Prentice-Hall, entitled
    • Chapter 5 of R. S. Pindyck and D. L. Rubinfeld, 1995. Microeconomics. Englewood Cliffs, N. J.: Prentice-Hall, entitled "Choice under uncertainty," provides an economic treatment of uncertainty.
    • (1995) Microeconomics
    • Pindyck, R.S.1    Rubinfeld, D.L.2
  • 24
    • 53349170039 scopus 로고    scopus 로고
    • note
    • There is a significant amount to be gained by establishing stable long standing trust relationships or certification agencies so as to avoid such calculations for the most part.
  • 26
    • 53349111330 scopus 로고    scopus 로고
    • note
    • I must caution that the case in this part of the paper is an example of a perfect information problem. The nature of information is much more general (the whole market). As such, I found it useful to break up the two cases to demonstrate that credit agencies could provide a wide range of information in depth, breadth, and detail regardless of whether the information was theoretically perfect or imperfect.
  • 28
    • 0011716149 scopus 로고    scopus 로고
    • Trust in a cryptographic economy and digital security deposits: Protocols and policies
    • Massachusetts Institute of Technology
    • See Joseph M. Reagle Jr., 1996. "Trust in a cryptographic economy and digital security deposits: Protocols and policies," Master of Science in Technology and Policy Thesis, Massachusetts Institute of Technology, http://rpcp.mit.edu/∼reagle/commerce/commerce.html
    • (1996) Master of Science in Technology and Policy Thesis
    • Reagle Jr., J.M.1
  • 29
    • 53349138253 scopus 로고    scopus 로고
    • note
    • Within the confines of the philosophical issue of "in as far as we can know what is true."
  • 30
    • 53349138255 scopus 로고
    • cypherpunks@toad.com: Tuesday, 21 Nov 1995 Cypherpunks' archives can be found
    • H. Finney and W. Dai, 1995. "Re: Towards a Theory of Reputation," cypherpunks@toad.com: Tuesday, 21 Nov 1995 15:32:08 -0800. Cypherpunks' archives can be found at http://www.hks.net/cpunks/index.html
    • (1995) Re: Towards a Theory of Reputation , vol.15 , Issue.32 , pp. 08-0800
    • Finney, H.1    Dai, W.2
  • 31
    • 33751514246 scopus 로고    scopus 로고
    • New York: Wiley
    • Certainly, reputation already plays a key part of many Internet communities including Internet Relay Chat (IRC), backgammon servers, chess servers, Netrek, and MUDS. For more details on some these environments, see Joe Pantusoi, Will Moss, Rawn Shah, and Jim Romine, 1996. The Complete Internet gamer. New York: Wiley.
    • (1996) The Complete Internet Gamer
    • Pantusoi, J.1    Moss, W.2    Shah, R.3    Romine, J.4
  • 32
    • 53349138255 scopus 로고
    • cypherpunks@toad.com: Tuesday, 21 Nov 1995 cypherpunks' archives
    • In H. Finney and W. Dai, 1995. "Re: Towards a Theory of Reputation," cypherpunks@toad.com: Tuesday, 21 Nov 1995 15:32:08 -0800; cypherpunks' archives at http://www.hks.net/cpunks/index.html
    • (1995) Re: Towards a Theory of Reputation , vol.15 , Issue.32 , pp. 08-0800
    • Finney, H.1    Dai, W.2
  • 33
    • 0003534211 scopus 로고    scopus 로고
    • Englewood Cliffs, N. J.: Prentice-Hall
    • R. S. Pindyck and D. L. Rubinfeld, 1995. Microeconomics. Englewood Cliffs, N. J.: Prentice-Hall, p. 157.
    • (1995) Microeconomics , pp. 157
    • Pindyck, R.S.1    Rubinfeld, D.L.2
  • 35
    • 33748697387 scopus 로고
    • The Place of information in economics
    • R. E. Babe (ed.), Boston: Kluwer
    • For work on information economics, see R. E. Babe, 1993. "The Place of information in economics," In: R. E. Babe (ed.), Information and communications in economics, Boston: Kluwer,
    • (1993) Information and Communications in Economics
    • Babe, R.E.1
  • 36
    • 33751513727 scopus 로고
    • J. Eatwell, M. Milgate, and P. Newman, eds., London: Macmillan Reference
    • and, J. Eatwell, M. Milgate, and P. Newman, eds., 1989. The New Palgrave: Allocation, information and markets. London: Macmillan Reference.
    • (1989) The New Palgrave: Allocation, Information and Markets
  • 37
    • 0003534211 scopus 로고    scopus 로고
    • Englewood Cliffs, N. J.: Prentice-Hall
    • R. S. Pindyck and D. L. Rubinfeld, 1995. Microeconomics. Englewood Cliffs, N. J.: Prentice-Hall, p. 594.
    • (1995) Microeconomics , pp. 594
    • Pindyck, R.S.1    Rubinfeld, D.L.2
  • 40
    • 53349138255 scopus 로고
    • cypherpunks@toad.com: Tuesday, 21 Nov 1995 archives
    • H. Finney and W. Dai, 1995. "Re: Towards a Theory of Reputation," cypherpunks@toad.com: Tuesday, 21 Nov 1995 15:32:08 -0800; archives at http://www.hks.net/cpunks/index.html
    • (1995) Re: Towards a Theory of Reputation , vol.15 , Issue.32 , pp. 08-0800
    • Finney, H.1    Dai, W.2
  • 42
    • 0001980141 scopus 로고
    • The Evolution of strategies in the iterated prisoner's dilemma
    • L. Davis, ed. London: Pittman
    • R. Axelrod, 1987. "The Evolution of strategies in the iterated prisoner's dilemma," in L. Davis, ed. Genetic algorithms & simulated annealing. London: Pittman;
    • (1987) Genetic Algorithms & Simulated Annealing
    • Axelrod, R.1
  • 45
    • 0002404001 scopus 로고
    • Working Paper for the Santa Fe Institute Economics Research Program, no. 95-06-052, abstract
    • D. F. Midgley, R. E. Marks, and L. G. Cooper, 1995. "Breeding competitive strategies," Working Paper for the Santa Fe Institute Economics Research Program, no. 95-06-052, p. 3; abstract at http://www.santafe.edu/sfi/ publications/Abstracts/95-06-052abs.html
    • (1995) Breeding Competitive Strategies , pp. 3
    • Midgley, D.F.1    Marks, R.E.2    Cooper, L.G.3
  • 46
    • 53349155297 scopus 로고
    • Working Paper for the Santa Fe Institute Economics Research Program, no. 95-04-041, abstract
    • L. K. Eisenberg, 1995. "Connectivity and financial network shutdown," Working Paper for the Santa Fe Institute Economics Research Program, no. 95-04-041, abstract at http://www.santafe.edu/sfi/publications/ Abstracts/95-04-041abs.html;
    • (1995) Connectivity and Financial Network Shutdown
    • Eisenberg, L.K.1
  • 47
    • 0000735601 scopus 로고
    • Money as a medium of exchange in an economy with artificially intelligent agents
    • R. Marimon, E. McGrattan, and T. J. Sargent, 1990. "Money as a medium of exchange in an economy with artificially intelligent agents," Journal of Economic Dynamics and Control, vol. 14, pp. 329-373;
    • (1990) Journal of Economic Dynamics and Control , vol.14 , pp. 329-373
    • Marimon, R.1    McGrattan, E.2    Sargent, T.J.3
  • 48
    • 0002404001 scopus 로고
    • Working Paper for the Santa Fe Institute Economics Research Program, no. 95-06-052, abstract
    • D. F. Midgley, R. E. Marks, and L. G. Cooper, 1995. "Breeding competitive strategies," Working Paper for the Santa Fe Institute Economics Research Program, no. 95-06-052, abstract at http://www.santafe.edu/sfi/ publications/Abstracts/95-06-052abs.html;
    • (1995) Breeding Competitive Strategies
    • Midgley, D.F.1    Marks, R.E.2    Cooper, L.G.3
  • 49
    • 53349132601 scopus 로고
    • Working Paper for the Santa Fe Institute Economics Research Program, no. 95-03-037, PostScript version available
    • I. Karatzas, M. Shubik, and W. D. Sudderth, 1995. "A Strategic market game with secured lending," Working Paper for the Santa Fe Institute Economics Research Program, no. 95-03-037, PostScript version available at http://www.santafe.edu/sfi/publications/Workinq-Papers/95-03-037.ps;
    • (1995) A Strategic Market Game with Secured Lending,"
    • Karatzas, I.1    Shubik, M.2    Sudderth, W.D.3
  • 50
    • 53349138254 scopus 로고
    • Working Paper for the Santa Fe Institute Economics Research Program, no. 95-01-004, PostScript version available
    • D. Lane, F. Malerba, R. Maxfield, and L. Orsenigo, 1995. "Choice and action," Working Paper for the Santa Fe Institute Economics Research Program, no. 95-01-004, PostScript version available at http://www.santafe.edu/ sfi/publications/Workinq-Papers/95-01-004.ps;
    • (1995) Choice and Action
    • Lane, D.1    Malerba, F.2    Maxfield, R.3    Orsenigo, L.4
  • 51
    • 53349131473 scopus 로고
    • Working Paper for the Santa Fe Institute Economics Research Program, no. 95-03-034, abstract
    • and, S. H. Paskov and J. F. Traub, 1995. "Faster valuation of financial derivatives," Working Paper for the Santa Fe Institute Economics Research Program, no. 95-03-034, abstract at http://www.santafe.edu/sfi/ publications/Abstracts/95-03-034abs.html
    • (1995) Faster Valuation of Financial Derivatives
    • Paskov, S.H.1    Traub, J.F.2
  • 53
    • 0042618199 scopus 로고
    • Working Paper for the Santa Fe Institute Economics Research Program, no. 94-03-013, abstract
    • and, N. J. Vriend, 1994, "Self-Organized markets in a decentralized economy," Working Paper for the Santa Fe Institute Economics Research Program, no. 94-03-013, abstract at http://www.santafe.edu/sfi/publications/ Abstracts/94-03-013abs.html
    • (1994) Self-Organized Markets in a Decentralized Economy
    • Vriend, N.J.1
  • 54
    • 0039248599 scopus 로고
    • The Economy of ideas
    • J. P. Barlow, 1994. "The Economy of ideas," Wired, vol. 2, no. 3, p. 84;
    • (1994) Wired , vol.2 , Issue.3 , pp. 84
    • Barlow, J.P.1
  • 55
    • 33751543692 scopus 로고
    • Can the conventional models apply? The Microeconomics of the information revolution
    • New York, New York (July 11-12, 1995), abstract
    • B. Don and D. Frelinger, 1995. "Can the conventional models apply? The Microeconomics of the information revolution," First USENIX Workshop on electronic commerce, New York, New York (July 11-12, 1995), abstract at http://www.usenix.org/publications/library/proceedinqs/ec95/don.html;
    • (1995) First USENIX Workshop on Electronic Commerce
    • Don, B.1    Frelinger, D.2
  • 56
    • 85094637842 scopus 로고
    • Economic mechanism design for computerized agents
    • New York, New York (July 11-12, 1995), abstract
    • and, H. R. Varian, 1995. "Economic mechanism design for computerized agents," First USENIX Workshop on electronic commerce, New York, New York (July 11-12, 1995), abstract at http://www.usenix.org/publications/library/ proceedinqs/ec95/varian.html
    • (1995) First USENIX Workshop on Electronic Commerce
    • Varian, H.R.1
  • 57
    • 0011468734 scopus 로고
    • Intellectual Value
    • E. Dyson, 1995. "Intellectual Value," Wired, vol. 3, no. 7, p. 137, and at http://www.hotwired.com/wired/3.07/features/dyson.html;
    • (1995) Wired , vol.3 , Issue.7 , pp. 137
    • Dyson, E.1
  • 58
    • 33751513727 scopus 로고
    • J. Eatwell, M. Milgate, and P. Newman, eds., London: Macmillan Reference
    • J. Eatwell, M. Milgate, and P. Newman, eds., 1989. The New Palgrave: Allocation, information and markets. London: Macmillan Reference;
    • (1989) The New Palgrave: Allocation, Information and Markets
  • 59
    • 0006298384 scopus 로고
    • The Evolution of economic institutions as a propaganda process
    • and, U. Witt, 1989. "The Evolution of economic institutions as a propaganda process," Public Choice, vol. 62, pp. 155-172.
    • (1989) Public Choice , vol.62 , pp. 155-172
    • Witt, U.1
  • 65
    • 53349155287 scopus 로고    scopus 로고
    • student group project for class 15.967: Electronic commerce and marketing, Sloan School of Management, Massachusetts Institute of Technology
    • S. Bendiek, K. Laws, and C. Woehler, 1996. "Brokers and intermediaries," a student group project for class 15.967: Electronic commerce and marketing, Sloan School of Management, Massachusetts Institute of Technology, at http://www-sloan.mit.edu/15.967/GROUP23/qroup%20project%232.html
    • (1996) Brokers and Intermediaries
    • Bendiek, S.1    Laws, K.2    Woehler, C.3
  • 66
    • 53349111336 scopus 로고
    • organized by the Institute of Mathematics and Its Applications and held at the University of Edinburgh in August 1989, L. C. Thomas, ed. Oxford: Clarendon Press
    • Credit scoring and credit control : based on the proceedings of a conference on credit scoring and credit control, organized by the Institute of Mathematics and Its Applications and held at the University of Edinburgh in August 1989, L. C. Thomas, ed. Oxford: Clarendon Press, 1992, p. v.
    • (1992) Credit Scoring and Credit Control: Based on the Proceedings of a Conference on Credit Scoring and Credit Control
  • 69
    • 0003424867 scopus 로고
    • Credit markets with asymmetric information
    • B. Beckmann and W. Krelle, eds. Berlin: Springer-Verlag
    • and, G. Clemenz, 1986. "Credit markets with asymmetric information," In: B. Beckmann and W. Krelle, eds. Lecture Notes in Economics and Mathematical Systems, Berlin: Springer-Verlag.
    • (1986) Lecture Notes in Economics and Mathematical Systems
    • Clemenz, G.1
  • 71
    • 0000735601 scopus 로고
    • Money as a medium of exchange in an economy with artificially intelligent agents
    • E.
    • R. Marimon, E. McGrattan, E., and T. J. Sargent, 1990. "Money as a medium of exchange in an economy with artificially intelligent agents," Journal of Economic Dynamics and Control, vol. 14, pp. 329-373.
    • (1990) Journal of Economic Dynamics and Control , vol.14 , pp. 329-373
    • Marimon, R.1    McGrattan, E.2    Sargent, T.J.3
  • 74
    • 53349126447 scopus 로고
    • ecash@digicash.com: Tuesday, 19 Dec 1995 In this paper, Patiwat Panurach (e-mail: pati@ipied.tu.ac.th), of the Faculty of Economics at Thammasat University in Bangkok
    • For instance, see P. Panurach, 1995. "The Economics of digital commerce: An Analysis of digital cash, electronic fund transfers, and ecash," ecash@digicash.com: Tuesday, 19 Dec 1995 12:42:23 +0700. In this paper, Patiwat Panurach (e-mail: pati@ipied.tu.ac.th), of the Faculty of Economics at Thammasat University in Bangkok, describes the characteristics of various digital instruments with respect to anonymity, liquidity, velocity, and money-supply.
    • (1995) The Economics of Digital Commerce: An Analysis of Digital Cash, Electronic Fund Transfers, and Ecash , vol.12 , Issue.42
    • Panurach, P.1
  • 75
    • 33751552615 scopus 로고
    • On Money
    • P. Huber, 1992. "On Money," Forbes, vol. 16, p. 144.
    • (1992) Forbes , vol.16 , pp. 144
    • Huber, P.1
  • 76
    • 33751552615 scopus 로고
    • On Money
    • P. Huber, "On Money," 1992. Forbes, vol. 16, p. 144. Op. cit.
    • (1992) Forbes , vol.16 , pp. 144
    • Huber, P.1
  • 77
    • 33751512658 scopus 로고    scopus 로고
    • SEC says brewery may use Internet to offer its stock
    • March 26
    • Originally it was actually processing trades and transactions itself but the SEC warned that it was not a licensed broker and the transactions should be carried out through a legitimate bank or escrow agent. See J. Taylor, 1996. "SEC says brewery may use Internet to offer its stock," Wall Street Journal (March 26), p. B4.
    • (1996) Wall Street Journal
    • Taylor, J.1
  • 78
    • 53349131471 scopus 로고    scopus 로고
    • SEC-LIVE can be found at http://www.seclive.com/
  • 79
    • 53349149761 scopus 로고    scopus 로고
    • http://www.ai.mit.edu/people/lethin/ecm.html
  • 80
    • 33751552131 scopus 로고    scopus 로고
    • Cambridge Trading Services Corp., "Letters of credit," http://www.cambtrade.com/Letters.html
    • Letters of Credit
  • 81
    • 53349149763 scopus 로고    scopus 로고
    • Article 5 of the Uniform Commercial Code deals with letters of credit and can be found at http://www.law.cornell.edu/ucc/5/overview.html
  • 82
    • 53349159049 scopus 로고
    • cypherpunks@toad.com: Tuesday, 19 Nov 1995
    • R. Hettinga, 1995. "e$: What's a digital bearer bond?," cypherpunks@toad.com: Tuesday, 19 Nov 1995 17:43:15; http://thumper.vmenq.com/ pub/rah/dbb.html
    • (1995) E$: What's a Digital Bearer Bond? , vol.17 , Issue.43 , pp. 15
    • Hettinga, R.1
  • 83
    • 33751532671 scopus 로고
    • Dimitri Vulis opined that "The fact that bearer bonds were outlawed suggests that if and when new ways are invented to conduct financial transactions that are conductive to tax evasion (e.g., using anonymous electronic payments), they too may become outlawed." See D. Vulis, 1995. "RE: Anonymity and intellectual capital," http://infinity.nus.sq/ cypherpunks/dir.archive-95.11.15-95.11.21/0267.html
    • (1995) RE: Anonymity and Intellectual Capital
    • Vulis, D.1
  • 84
    • 53349159049 scopus 로고
    • cypherpunks@toad.com: Tuesday, 19 Nov 1995
    • R. Hettinga, 1995. "e$: What's a digital bearer bond?," cypherpunks@toad.com: Tuesday, 19 Nov 1995 17:43:15; http://thumper.vmenq.com/ pub/rah/dbb.html
    • (1995) E$: What's a Digital Bearer Bond? , vol.17 , Issue.43 , pp. 15
    • Hettinga, R.1
  • 85
    • 53349122936 scopus 로고    scopus 로고
    • note
    • Some mechanisms that are not being used or have been incorporated into other proposals include iKP, Secure Transaction Technology, Secure Electronic Payment Protocol, Netscape's Secure Courier, the Simple Network Payment Protocol, the Hewlett Packard Payment Method, and Anonymous Internet Mercantile Protocol.
  • 86
    • 53349093758 scopus 로고    scopus 로고
    • This information was formerly part of the Frequently Asked Questions file for the Security First Network Bank. This site has been reorganized and this information has been dispersed. Visit the Bank's site at http://www.sfnb.com/ infodesk/infodesk.html for more information.
  • 87
    • 0004198635 scopus 로고    scopus 로고
    • Englewood Cliffs, N. J.: Prentice-Hall
    • C. P. Pfleeger, 1989. Security in computing. Englewood Cliffs, N. J.: Prentice-Hall, p. 132.
    • (1989) Security in Computing , pp. 132
    • Pfleeger, C.P.1
  • 89
    • 0346870109 scopus 로고
    • How to say "no"
    • J.-J. Quisquater and J. Vandewalle, eds. Advances in Cryptology - EUROCRYPT '89
    • A. Beutelspacher, 1990. "How to say "no"," In: J.-J. Quisquater and J. Vandewalle, eds. Advances in Cryptology - EUROCRYPT '89, Lecture Notes in Computer Science vol. 434, p. 491.
    • (1990) Lecture Notes in Computer Science , vol.434 , pp. 491
    • Beutelspacher, A.1
  • 90
    • 84957613612 scopus 로고
    • Ripping coins for a fair exchange
    • L. C. Guillou and J.-J. Quisquater, eds. Advances in Cryptology - EUROCRYPT '95
    • M. Jakobsson, 1995. "Ripping coins for a fair exchange," In: L. C. Guillou and J.-J. Quisquater, eds. Advances in Cryptology - EUROCRYPT '95, Lecture Notes in Computer Science, vol. 921, p. 220.
    • (1995) Lecture Notes in Computer Science , vol.921 , pp. 220
    • Jakobsson, M.1
  • 91
    • 0011716149 scopus 로고    scopus 로고
    • Trust in a cryptographic economy and digital security deposits: Protocols and policies
    • Massachusetts Institute of Technology
    • Joseph M. Reagle Jr., 1996. "Trust in a cryptographic economy and digital security deposits: Protocols and policies," Master of Science in Technology and Policy Thesis, Massachusetts Institute of Technology, http://rpcp.mit.edu/∼reagle/commerce/commerce.html
    • (1996) Master of Science in Technology and Policy Thesis
    • Reagle Jr., J.M.1
  • 92
    • 8344289547 scopus 로고
    • Technical change in the televisionindust ry: Between "path- dependence" and new flexibilities
    • The concept of precedent dependency is related to "path- dependence" as discussed by P. Kavassalis, 1995. "Technical change in the televisionindust ry: Between "path-dependence" and new flexibilities," Communications & Strategies, vol. 17, p. 77.
    • (1995) Communications & Strategies , vol.17 , pp. 77
    • Kavassalis, P.1
  • 94
    • 53349170037 scopus 로고    scopus 로고
    • See http://www.cpsr.org/dox/wiretap.html
  • 95
    • 53349122935 scopus 로고    scopus 로고
    • note
    • These wiretaps would be very convenient. Law enforcement agency could request that all pertinent calls be routed to their own facilities for monitoring.
  • 97
    • 53349155298 scopus 로고    scopus 로고
    • note
    • The significant civil issue is to whom are the default rules useful for? Democratic societies generally strive to make legislation fair and useful to all.
  • 98
    • 0002227725 scopus 로고
    • Anarchy, state, and the Internet: An Essay on law-making in cyberspace
    • article 3
    • D. Post, 1995. "Anarchy, state, and the Internet: An Essay on law-making in cyberspace," 1995 Journal of Online Law, article 3, at http://fatty.law.cornell.edu/jol/jol.table.html
    • (1995) 1995 Journal of Online Law
    • Post, D.1
  • 99
    • 53349132600 scopus 로고    scopus 로고
    • Bert-Jaap Koops' extensive Crypto-Law Survey
    • See Bert-Jaap Koops' extensive Crypto-Law Survey at http://cwis.kub.nl/ ∼frw/people/koops/lawsurvy.htm
  • 100
    • 33751549880 scopus 로고    scopus 로고
    • archive
    • Information on all of these points can be found in the Electronic Frontier Foundation "Privacy, Security, Crypto, Surveillance" archive at http://www.eff.org/pub/Privacy/
    • Privacy, Security, Crypto, Surveillance
  • 101
    • 53349126449 scopus 로고    scopus 로고
    • "In 1984, the President had issued a National Security Decision Directive, NSDD-145, which gave the intelligence agencies broad authority to peruse computer databases, for so-called 'sensitive but unclassified information.' A subsequent memorandum from John Poindexter, expanded this authority still further to include 'all computer and communications security for the Federal Government and private industry.' As the government's authority to control access to computerized information for the purpose of protecting national security expanded, the free of flow of information diminished. Stories of agents visiting private information vendors and public libraries soon followed. At the same time, a wide range of other activities by the government further threatened to restrict access to information." Marc Rotenberg's prepared testimony on The Computer Security Act Of 1987 (P. L. 100-235) and The Memorandum Of Understanding Between The National Institute Of Standards Technology (NIST) And The National Security Agency (NSA) Before The Subcommittee on Legislation and National Security, Committee on Government Operations U. S. House of Representatives. May 4, 1989. See http://www.epic.org/crypto/csa/ rotenberg_testimony.txt
  • 104
    • 53349131472 scopus 로고    scopus 로고
    • Legislation and reports on digital signature may be found at http://web.aimnet.com/∼software/industry_issues/1digsig.htm
  • 105
    • 53349086525 scopus 로고    scopus 로고
    • See the Utah Digital Signature Legislation Base at http://www.gvnfo. state.ut.us/ccjj/digsig/
  • 107
    • 53349115049 scopus 로고    scopus 로고
    • The guideline is no longer freely available to the public. Information on the guidelines can be found at: http://www.intermarket.com/ecl/
  • 110
    • 33751552735 scopus 로고    scopus 로고
    • Electronic cash and monetary policy
    • M. Bernkopf, 1996. "Electronic cash and monetary policy," First Monday, vol. 1, no. 1, http://www.firstmonday.org/?journal=fm&page= article&op=view&path[]=465;
    • (1996) First Monday , vol.1 , Issue.1
    • Bernkopf, M.1
  • 114
    • 33645775074 scopus 로고    scopus 로고
    • Law and borders: The Rise of law in cyberspace
    • D. R. Johnson and D. Post, 1996. "Law and borders: The Rise of law in cyberspace," First Monday, vol. 1, no. 1, http://www.firstmonday.org/? journal=fm&ipaqe=article&op=view&path[]=468;
    • (1996) First Monday , vol.1 , Issue.1
    • Johnson, D.R.1    Post, D.2
  • 115
    • 0002227725 scopus 로고
    • Anarchy, state, and the Internet: An Essay on law-making in cyberspace
    • article 3
    • D. Post, 1995. "Anarchy, state, and the Internet: An Essay on law-making in cyberspace," 1995 Journal of Online Law, article 3, http://fatty.law.cornell.edu/jol/jol.table.html;
    • (1995) 1995 Journal of Online Law
    • Post, D.1
  • 118
    • 33751537438 scopus 로고    scopus 로고
    • Government, cryptography, and the right to privacy
    • and J. Shearer and P. Gutmann, 1996. "Government, cryptography, and the right to privacy," Journal of Universal Computer Science, http://hyperg.iicm.tu-graz.ac.at/ qovernment_cryptography_and_the_right_to_privacy_htf;sk=2F074060
    • (1996) Journal of Universal Computer Science
    • Shearer, J.1    Gutmann, P.2
  • 119
    • 53349088579 scopus 로고    scopus 로고
    • Pressure on Austrian bank laws
    • London, (April 12)
    • Reuters (Vienna), 1996. "Pressure on Austrian bank laws," Financial Times (London), (April 12).
    • (1996) Financial Times
  • 120
    • 53349140329 scopus 로고    scopus 로고
    • note
    • Quoting from an electronic mail message addressed to the author, "We can execute your financial transactions, move cash from bank to bank, from brokerage accounts to bank, attorney, escrow account, etc. You instruct us by PGP as to what you need accomplished."
  • 121
    • 53349170036 scopus 로고    scopus 로고
    • IRS, FBI eye Internet with suspicion
    • (January), summary can be found on Edupage for 9 January 1996
    • Investor's Business Daily (1996), "IRS, FBI eye Internet with suspicion," vol. 9 (January), p. B1; summary can be found on Edupage for 9 January 1996 at http://educom.edu/edupage.old/edupage.96/edupage-01.10.96
    • (1996) Investor's Business Daily , vol.9


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.