


default search action
5th Financial Cryptography 2001: Grand Cayman, British West Indies
- Paul F. Syverson:

Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings. Lecture Notes in Computer Science 2339, Springer 2002, ISBN 3-540-44079-8
Managing Payment Transaction Costs
- Moses D. Liskov, Silvio Micali:

Amortized E-Cash. 1-20 - Matt Blaze, John Ioannidis, Angelos D. Keromytis:

Offline Micropayments without Trusted Hardware. 21-40
Panel (I)
- Nicko van Someren:

The Practical Problems of Implementing MicroMint. 41-50 - Yair Frankel:

Protecting Digital Rights. 42-44 - David W. Kravitz:

Aspects of Digital Rights Management and the Use of Hardware Security Devices. 45-49 - Scott Moskowitz:

A Solution to the Napster Phenomenon: Why Value Cannot Be Created Absent the Transfer of Subjective Data. 50-54 - Tomas Sander:

Golden Times for Digital Rights Management? 55-65 - Jeremy Wyant:

Applicability of Public Key Cryptosystems to Digital Rights Management Applications. 66-69
Trust and Risk Management
- Tadayoshi Kohno, Mark McGovern:

On the Global Content PMI: Improved Copy-Protected Internet Content Distribution. 70-81 - L. Jean Camp, Helen Nissenbaum, Cathleen McGrath:

Trust: A Collision of Paradigms. 82-96
Groups and Anonymity
- Éliane Jaulmes, Guillaume Poupard:

On the Security of Homage Group Authentication Protocol. 97-107 - Dahlia Malkhi, Elan Pavlov:

Anonymity without 'Cryptography'. 108-126 - Dennis Kügler, Holger Vogt:

Fair Tracing without Trustees. 127-139
Invited Talk
- Richard W. Rahn:

Why the War on Money Laundering Should Be Aborted. 140-146
Certificates and Authentication
- Daniel R. L. Brown, Robert P. Gallant, Scott A. Vanstone:

Provably Secure Implicit Certificate Schemes. 147-156 - Ninghui Li, Joan Feigenbaum:

Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation. 157-168 - Markus Jakobsson, David Pointcheval

:
Mutual Authentication for Low-Power Mobile Devices. 169-186
Credit Card Security
- Aviel D. Rubin, Rebecca N. Wright:

Off-Line Generation of Limited-Use Credit Card Numbers. 187-200 - Yiannis Tsiounis:

A Security Framework for Card-Based Systems. 201-222 - Adi Shamir:

SecureClick: A Web Payment System with Disposable Credit Card Numbers. 223-233
Panel (II)
- Ed Gerck, C. Andrew Neff, Ronald L. Rivest, Aviel D. Rubin, Moti Yung:

The Business of Electronic Voting. 234-259
Marekts and Multiparty Computation
- Giovanni Di Crescenzo:

Privacy for the Stock Market. 259-278 - Philippe Golle, Stuart G. Stubblebine:

Secure Distributed Computing in a Commercial Environment. 279-294
Signatures in Financial Cryptography
- David Naccache, David Pointcheval

, Christophe Tymen:
Monotone Signatures. 295-308 - Mihir Bellare, Chanathip Namprempre, David Pointcheval

, Michael Semanko:
The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme. 309-328 - Olivier Markowitch, Shahrokh Saeednia:

Optimistic Fair Exchange with Transparent Signature Recovery. 329-340
Auctions
- Hiroaki Kikuchi:

(M+1)st-Price Auction Protocol. 341-353 - Olivier Baudron, Jacques Stern:

Non-interactive Private Auctions. 354-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














