Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/fc/fc2004.bht:"
@inproceedings{DBLP:conf/fc/AtenieseM04, author = {Giuseppe Ateniese and Breno de Medeiros}, editor = {Ari Juels}, title = {Identity-Based Chameleon Hash and Applications}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {164--180}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_19}, doi = {10.1007/978-3-540-27809-2\_19}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AtenieseM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BermanFT04, author = {Ron Berman and Amos Fiat and Amnon Ta{-}Shma}, editor = {Ari Juels}, title = {Provable Unlinkability against Traffic Analysis}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {266--280}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_26}, doi = {10.1007/978-3-540-27809-2\_26}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BermanFT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Camp04, author = {L. Jean Camp}, editor = {Ari Juels}, title = {Mental Models of Computer Security}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {106--111}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_12}, doi = {10.1007/978-3-540-27809-2\_12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Camp04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ElkindL04, author = {Edith Elkind and Helger Lipmaa}, editor = {Ari Juels}, title = {Interleaving Cryptography and Mechanism Design: The Case of Online Auctions}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {117--131}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_16}, doi = {10.1007/978-3-540-27809-2\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ElkindL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/EnzmannFS04, author = {Matthias Enzmann and Marc Fischlin and Markus Schneider}, editor = {Ari Juels}, title = {A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {24--38}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_4}, doi = {10.1007/978-3-540-27809-2\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/EnzmannFS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GentryR04, author = {Craig Gentry and Zulfikar Ramzan}, editor = {Ari Juels}, title = {Microcredits for Verifiable Foreign Service Provider Metering}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {9--23}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_3}, doi = {10.1007/978-3-540-27809-2\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/GentryR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Groth04, author = {Jens Groth}, editor = {Ari Juels}, title = {Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {90--104}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_10}, doi = {10.1007/978-3-540-27809-2\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Groth04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Hoepman04, author = {Jaap{-}Henk Hoepman}, editor = {Ari Juels}, title = {The Ephemeral Pairing Problem}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {212--226}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_22}, doi = {10.1007/978-3-540-27809-2\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Hoepman04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KiayiasY04, author = {Aggelos Kiayias and Moti Yung}, editor = {Ari Juels}, title = {The Vector-Ballot e-Voting Approach}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {72--89}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_9}, doi = {10.1007/978-3-540-27809-2\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KiayiasY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KonstantinouLSSY04, author = {Elisavet Konstantinou and Vasiliki Liagkou and Paul G. Spirakis and Yannis C. Stamatiou and Moti Yung}, editor = {Ari Juels}, title = {Electronic National Lotteries}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {147--163}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_18}, doi = {10.1007/978-3-540-27809-2\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KonstantinouLSSY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/LevineRWW04, author = {Brian Neil Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright}, editor = {Ari Juels}, title = {Timing Attacks in Low-Latency Mix Systems (Extended Abstract)}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {251--265}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_25}, doi = {10.1007/978-3-540-27809-2\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/LevineRWW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MathewsonD04, author = {Nick Mathewson and Roger Dingledine}, editor = {Ari Juels}, title = {Mixminion: Strong Anonymity for Financial Cryptography}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {227--232}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_23}, doi = {10.1007/978-3-540-27809-2\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MathewsonD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/OGormanBB04, author = {Lawrence O'Gorman and Amit Bagga and Jon Louis Bentley}, editor = {Ari Juels}, title = {Call Center Customer Verification by Query-Directed Passwords}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {54--67}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_6}, doi = {10.1007/978-3-540-27809-2\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/OGormanBB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Patrick04, author = {Andrew S. Patrick}, editor = {Ari Juels}, title = {Usability and Acceptability of Biometric Security Systems}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {105}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_11}, doi = {10.1007/978-3-540-27809-2\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Patrick04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Peha04, author = {Jon M. Peha}, editor = {Ari Juels}, title = {Bringing Payment Technology to the Unbanked (Abstract)}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {116}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_15}, doi = {10.1007/978-3-540-27809-2\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Peha04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/PersianoV04, author = {Giuseppe Persiano and Ivan Visconti}, editor = {Ari Juels}, title = {An Efficient and Usable Multi-show Non-transferable Anonymous Credential System}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {196--211}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_21}, doi = {10.1007/978-3-540-27809-2\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/PersianoV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Pugh04, author = {Simon Pugh}, editor = {Ari Juels}, title = {PayPass Security and Risk (Abstract)}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {70--71}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_8}, doi = {10.1007/978-3-540-27809-2\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Pugh04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RennhardP04, author = {Marc Rennhard and Bernhard Plattner}, editor = {Ari Juels}, title = {Practical Anonymity for the Masses with MorphMix}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {233--250}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_24}, doi = {10.1007/978-3-540-27809-2\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/RennhardP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Rivest04, author = {Ronald L. Rivest}, editor = {Ari Juels}, title = {Peppercoin Micropayments}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {2--8}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_2}, doi = {10.1007/978-3-540-27809-2\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Rivest04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Selby04, author = {Jack R. Selby}, editor = {Ari Juels}, title = {Analyzing the Success and Failure of Recent e-Payment Schemes (Abstract)}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {1}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_1}, doi = {10.1007/978-3-540-27809-2\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Selby04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Stern04, author = {Jacques Stern}, editor = {Ari Juels}, title = {Cryptography and the French Banking Cards: Past, Present, Future}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {68--69}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_7}, doi = {10.1007/978-3-540-27809-2\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Stern04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/StubblebineO04, author = {Stuart G. Stubblebine and Paul C. van Oorschot}, editor = {Ari Juels}, title = {Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract)}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {39--53}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_5}, doi = {10.1007/978-3-540-27809-2\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/StubblebineO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Teague04, author = {Vanessa Teague}, editor = {Ari Juels}, title = {Selecting Correlated Random Actions}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {181--195}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_20}, doi = {10.1007/978-3-540-27809-2\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Teague04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Yee04, author = {Ka{-}Ping Yee}, editor = {Ari Juels}, title = {Secure Interaction Design}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {114--115}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_14}, doi = {10.1007/978-3-540-27809-2\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Yee04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/YokooS04, author = {Makoto Yokoo and Koutarou Suzuki}, editor = {Ari Juels}, title = {Secure Generalized Vickrey Auction without Third-party Servers}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {132--146}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_17}, doi = {10.1007/978-3-540-27809-2\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/YokooS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Yurick04, author = {William Yurcik}, editor = {Ari Juels}, title = {Visualization Tools for Security Administrators}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {112--113}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_13}, doi = {10.1007/978-3-540-27809-2\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Yurick04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2004, editor = {Ari Juels}, title = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b98935}, doi = {10.1007/B98935}, isbn = {3-540-22420-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.