ORPP logo
Image from Google Jackets

Tethered Money : Managing Digital Currency Transactions.

By: Material type: TextTextPublisher: San Diego : Elsevier Science & Technology, 2015Copyright date: ©2016Edition: 1st edDescription: 1 online resource (174 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780128034972
Subject(s): Genre/Form: Additional physical formats: Print version:: Tethered MoneyDDC classification:
  • 332.1/78
LOC classification:
  • HG1710 .S265 2015
Online resources:
Contents:
Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Purpose -- Prologue -- Roadmap -- Quotations -- Introduction: Tethered Money - a Game Changer -- Chapter 1 - Money: An Irreverent Analysis -- Money: the numeric residue of society -- Money: mightier than the sword -- Money: the great invention -- Money is power -- Money: man-made mystery -- Money: mirage -- Money: mirage fraud -- Short Range -- Reconciliation -- Confusion -- Self-anchored money -- Money on behalf of the people (central banks) -- Cascaded Digital Money -- The Internet of Things, Avatars, and Robotics -- Money: changed by cryptography -- Is It Working? -- Security -- The Off-Currency -- Money: tethered -- Interest Rate -- History -- Money: an innovation turtle -- "Catch me if you can": the ultimate currency war -- Conspiracy theories -- Chapter 2 - Tethered Money: Use and Impact -- Earned versus granted -- Investment -- Management -- Tethering Visibility Management -- Tethering Flexibility -- Surrogate mint/subcontracted tethering -- Innovation -- Government -- The Tax Code -- Healthcare -- Gambling -- Charity -- Death Wish -- World bank -- Emergency management -- Insurance -- Trust trap -- Tethered trade -- Tethering trade -- Retethering -- Personal payment and privacy -- Community bootstrapping -- Burn pay -- Pay-as-you-go -- The new electricity market -- Nanopayments -- Access versus use -- Napster revived -- Loyalty programs -- Activation -- Imaging -- Credit -- The banking paradox -- In the hands of our adversaries -- International scope -- Financial democracy (voting with our taxes) -- Chapter 3 - Digital Money: The Security Nightmare -- Cyber insecurity: always with us! -- The general purpose computer and its inherent insecurity -- Complexity: where security and insecurity meet -- Complexity: how do we manage it today? -- Remote access and identity management.
Big Data, Not Always so Big -- The data/software shared storage -- Complexity used as a shield -- The quantum threat -- The security advantage of digital currency -- Deterrence -- The Trading Community -- Deterrence Through Society at Large -- The oracle -- Entropic coins -- Entropic coins: informative masking -- The sub-oracle -- Transit security -- InterMint security -- Tightening the defense perimeter -- Digital currency: the complexity route -- Durable cryptography -- Chapter 4 - Anatomy of Digital Money Products -- Theory and definition of digital coins -- Randomized Coins -- Nonrandomized Coins -- Payment Activity Masking -- Bitcoin: the vision -- Self-Anchored -- Generating Money by Agreement to Reward Computational Accomplishment -- Using Transactional Transparency to Safeguard Trading Integrity -- Vulnerability to Erosive Cryptographic Intractability -- Vulnerability to Leadership Corruption -- Finite Amount of Bitcoins -- Bitcoin struggle for impact and survival -- Stability -- Hooking Bitcoin to an External Source of Value -- Internal Bitcoin Stabilizer -- Bitcoin Vulnerability to Erosive Cryptographic Intractability -- Bitcoin Vulnerability to Leadership Corruption -- Attacks on Bitcoin -- Digitized fiat money and other commodities -- Fiat.Bitcoin Currency -- Fiat Digital Currency: Claim Check Format -- Early Claim-Check Digital Money -- David Chaum's Anonymity -- Modern Claim-Check Digital Money -- Digital Money Primary Risk -- Digital Money Secondary Risk -- Anatomy of Ad-Hoc Payment -- Ad-Hoc Cyber Security -- The Insecurity of Ad-Hoc Cyber Security -- Man-in-the-Middle Fraud -- MiM vs. Digital Cash Payment -- Printed digital coins -- Prepaid transactions -- Hybrid coins -- Accompanying Essays -- A Brief History of Cryptography -- Cryptographic Signatures -- Daniel - Digital Money Friendly Cipher -- Glossary -- Further Readings.
Index -- About the Author.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Purpose -- Prologue -- Roadmap -- Quotations -- Introduction: Tethered Money - a Game Changer -- Chapter 1 - Money: An Irreverent Analysis -- Money: the numeric residue of society -- Money: mightier than the sword -- Money: the great invention -- Money is power -- Money: man-made mystery -- Money: mirage -- Money: mirage fraud -- Short Range -- Reconciliation -- Confusion -- Self-anchored money -- Money on behalf of the people (central banks) -- Cascaded Digital Money -- The Internet of Things, Avatars, and Robotics -- Money: changed by cryptography -- Is It Working? -- Security -- The Off-Currency -- Money: tethered -- Interest Rate -- History -- Money: an innovation turtle -- "Catch me if you can": the ultimate currency war -- Conspiracy theories -- Chapter 2 - Tethered Money: Use and Impact -- Earned versus granted -- Investment -- Management -- Tethering Visibility Management -- Tethering Flexibility -- Surrogate mint/subcontracted tethering -- Innovation -- Government -- The Tax Code -- Healthcare -- Gambling -- Charity -- Death Wish -- World bank -- Emergency management -- Insurance -- Trust trap -- Tethered trade -- Tethering trade -- Retethering -- Personal payment and privacy -- Community bootstrapping -- Burn pay -- Pay-as-you-go -- The new electricity market -- Nanopayments -- Access versus use -- Napster revived -- Loyalty programs -- Activation -- Imaging -- Credit -- The banking paradox -- In the hands of our adversaries -- International scope -- Financial democracy (voting with our taxes) -- Chapter 3 - Digital Money: The Security Nightmare -- Cyber insecurity: always with us! -- The general purpose computer and its inherent insecurity -- Complexity: where security and insecurity meet -- Complexity: how do we manage it today? -- Remote access and identity management.

Big Data, Not Always so Big -- The data/software shared storage -- Complexity used as a shield -- The quantum threat -- The security advantage of digital currency -- Deterrence -- The Trading Community -- Deterrence Through Society at Large -- The oracle -- Entropic coins -- Entropic coins: informative masking -- The sub-oracle -- Transit security -- InterMint security -- Tightening the defense perimeter -- Digital currency: the complexity route -- Durable cryptography -- Chapter 4 - Anatomy of Digital Money Products -- Theory and definition of digital coins -- Randomized Coins -- Nonrandomized Coins -- Payment Activity Masking -- Bitcoin: the vision -- Self-Anchored -- Generating Money by Agreement to Reward Computational Accomplishment -- Using Transactional Transparency to Safeguard Trading Integrity -- Vulnerability to Erosive Cryptographic Intractability -- Vulnerability to Leadership Corruption -- Finite Amount of Bitcoins -- Bitcoin struggle for impact and survival -- Stability -- Hooking Bitcoin to an External Source of Value -- Internal Bitcoin Stabilizer -- Bitcoin Vulnerability to Erosive Cryptographic Intractability -- Bitcoin Vulnerability to Leadership Corruption -- Attacks on Bitcoin -- Digitized fiat money and other commodities -- Fiat.Bitcoin Currency -- Fiat Digital Currency: Claim Check Format -- Early Claim-Check Digital Money -- David Chaum's Anonymity -- Modern Claim-Check Digital Money -- Digital Money Primary Risk -- Digital Money Secondary Risk -- Anatomy of Ad-Hoc Payment -- Ad-Hoc Cyber Security -- The Insecurity of Ad-Hoc Cyber Security -- Man-in-the-Middle Fraud -- MiM vs. Digital Cash Payment -- Printed digital coins -- Prepaid transactions -- Hybrid coins -- Accompanying Essays -- A Brief History of Cryptography -- Cryptographic Signatures -- Daniel - Digital Money Friendly Cipher -- Glossary -- Further Readings.

Index -- About the Author.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.