Search dblp for Publications

export results for "toc:db/conf/fc/fc2005.bht:"

 download as .bib file

@inproceedings{DBLP:conf/fc/AbdallaP05,
  author       = {Michel Abdalla and
                  David Pointcheval},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Interactive Diffie-Hellman Assumptions with Applications to Password-Based
                  Authentication},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {341--356},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_31},
  doi          = {10.1007/11507840\_31},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/AbdallaP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AtallahFGT05,
  author       = {Mikhail J. Atallah and
                  Keith B. Frikken and
                  Michael T. Goodrich and
                  Roberto Tamassia},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Secure Biometric Authentication for Weak Computational Devices},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {357--371},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_32},
  doi          = {10.1007/11507840\_32},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AtallahFGT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Avoine05,
  author       = {Gildas Avoine},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Fraud Within Asymmetric Multi-hop Cellular Networks},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_1},
  doi          = {10.1007/11507840\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Avoine05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AvoineO05,
  author       = {Gildas Avoine and
                  Philippe Oechslin},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {{RFID} Traceability: {A} Multilayer Problem},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {125--140},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_14},
  doi          = {10.1007/11507840\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AvoineO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BaggaM05,
  author       = {Walid Bagga and
                  Refik Molva},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Policy-Based Cryptography and Applications},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {72--87},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_7},
  doi          = {10.1007/11507840\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BaggaM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BrandtS05,
  author       = {Felix Brandt and
                  Tuomas Sandholm},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Efficient Privacy-Preserving Protocols for Multi-unit Auctions},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {298--312},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_26},
  doi          = {10.1007/11507840\_26},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BrandtS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChenESSS05,
  author       = {Liqun Chen and
                  Matthias Enzmann and
                  Ahmad{-}Reza Sadeghi and
                  Markus Schneider and
                  Michael Steiner},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {A Privacy-Protecting Coupon System},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {93--108},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_12},
  doi          = {10.1007/11507840\_12},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ChenESSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Clayton05,
  author       = {Richard Clayton},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Who'd Phish from the Summit of Kilimanjaro?},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {91--92},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_11},
  doi          = {10.1007/11507840\_11},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/Clayton05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ClaytonDJMSS05,
  author       = {Richard Clayton and
                  Drew Dean and
                  Markus Jakobsson and
                  Steven A. Myers and
                  Stuart G. Stubblebine and
                  Michael Szydlo},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {A Chat at the Old Phishin' Hole},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {88},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_8},
  doi          = {10.1007/11507840\_8},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ClaytonDJMSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CrescenzoGGA05,
  author       = {Giovanni Di Crescenzo and
                  R. F. Graveman and
                  Renwei Ge and
                  Gonzalo R. Arce},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Approximate Message Authentication and Biometric Entity Authentication},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {240--254},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_22},
  doi          = {10.1007/11507840\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CrescenzoGGA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DagonLL05,
  author       = {David Dagon and
                  Wenke Lee and
                  Richard J. Lipton},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Protecting Secret Data from Insider Attacks},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {16--30},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_2},
  doi          = {10.1007/11507840\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DagonLL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DodisY05,
  author       = {Yevgeniy Dodis and
                  Dae Hyun Yum},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Time Capsule Signature},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {57--71},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_6},
  doi          = {10.1007/11507840\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DodisY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Eilebrecht05,
  author       = {Lars Eilebrecht},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Ciphire Mail Email Encryption and Authentication},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {211--224},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_20},
  doi          = {10.1007/11507840\_20},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Eilebrecht05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ElkindL05,
  author       = {Edith Elkind and
                  Helger Lipmaa},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Small Coalitions Cannot Manipulate Voting},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {285--297},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_25},
  doi          = {10.1007/11507840\_25},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ElkindL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Friedman05,
  author       = {Allan Friedman},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Panel Summary: Incentives, Markets and Information Security},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {372--373},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_33},
  doi          = {10.1007/11507840\_33},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Friedman05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/FrikkenA05,
  author       = {Keith B. Frikken and
                  Mikhail J. Atallah},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Achieving Fairness in Private Contract Negotiation},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {270--284},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_24},
  doi          = {10.1007/11507840\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/FrikkenA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GarfinkelSNMM05,
  author       = {Simson L. Garfinkel and
                  Jeffrey I. Schiller and
                  Erik Nordlander and
                  David Margrave and
                  Robert C. Miller},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {188--202},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_18},
  doi          = {10.1007/11507840\_18},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GarfinkelSNMM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Gavish05,
  author       = {Bezalel Gavish},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Trust and Swindling on the Internet},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {44},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_4},
  doi          = {10.1007/11507840\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Gavish05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GentryRS05,
  author       = {Craig Gentry and
                  Zulfikar Ramzan and
                  Stuart G. Stubblebine},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Secure Distributed \emph{Human} Computation},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {328--332},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_28},
  doi          = {10.1007/11507840\_28},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GentryRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GodinezHM05,
  author       = {Fernando God{\'{\i}}nez and
                  Dieter Hutter and
                  Ra{\'{u}}l Monroy},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Audit File Reduction Using N-Gram Models},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {336--340},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_30},
  doi          = {10.1007/11507840\_30},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GodinezHM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GohG05,
  author       = {Eu{-}Jin Goh and
                  Philippe Golle},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Event Driven Private Counters},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {313--327},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_27},
  doi          = {10.1007/11507840\_27},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GohG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Jakobsson05,
  author       = {Markus Jakobsson},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Modeling and Preventing Phishing Attacks},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {89},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_9},
  doi          = {10.1007/11507840\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Jakobsson05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JareckiS05,
  author       = {Stanislaw Jarecki and
                  Vitaly Shmatikov},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Probabilistic Escrow of Financial Transactions with Cumulative Threshold
                  Disclosure},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {172--187},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_17},
  doi          = {10.1007/11507840\_17},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JareckiS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KiayiasM05,
  author       = {Aggelos Kiayias and
                  Antonina Mitrofanova},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Testing Disjointness of Private Datasets},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {109--124},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_13},
  doi          = {10.1007/11507840\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KiayiasM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KingS05,
  author       = {Jeff King and
                  Andr{\'{e}} L. M. dos Santos},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {A User-Friendly Approach to Human Authentication of Messages},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {225--239},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_21},
  doi          = {10.1007/11507840\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KingS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Koyfman05,
  author       = {Andrew Koyfman},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Securing Sensitive Data with the Ingrian DataSecure Platform},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {203--210},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_19},
  doi          = {10.1007/11507840\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Koyfman05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MukhamedovKR05,
  author       = {Aybek Mukhamedov and
                  Steve Kremer and
                  Eike Ritter},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Analysis of a Multi-party Fair Exchange Protocol and Formal Proof
                  of Correctness in the Strand Space Model},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {255--269},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_23},
  doi          = {10.1007/11507840\_23},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MukhamedovKR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Myers05,
  author       = {Steven A. Myers},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Helping the Phish Detect the Lure},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {90},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_10},
  doi          = {10.1007/11507840\_10},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Myers05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/OorschotS05,
  author       = {Paul C. van Oorschot and
                  Stuart G. Stubblebine},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking,
                  and Funneling},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {31--43},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_3},
  doi          = {10.1007/11507840\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/OorschotS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/SuzukiY05,
  author       = {Koutarou Suzuki and
                  Makoto Yokoo},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Secure Multi-attribute Procurement Auction},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {333--335},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_29},
  doi          = {10.1007/11507840\_29},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/SuzukiY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Szydlo05,
  author       = {Michael Szydlo},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Risk Assurance for Hedge Funds Using Zero Knowledge Proofs},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {156--171},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_16},
  doi          = {10.1007/11507840\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Szydlo05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/TuylsSSAO05,
  author       = {Pim Tuyls and
                  Boris Skoric and
                  S. Stallinga and
                  Anton H. M. Akkermans and
                  W. Ophey},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Information-Theoretic Security Analysis of Physical Uncloneable Functions},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {141--155},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_15},
  doi          = {10.1007/11507840\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/TuylsSSAO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ZhangSM05,
  author       = {Fangguo Zhang and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Identity-Based Partial Message Recovery Signatures (or How to Shorten
                  ID-Based Signatures)},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {45--56},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_5},
  doi          = {10.1007/11507840\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/ZhangSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2005,
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b137875},
  doi          = {10.1007/B137875},
  isbn         = {3-540-26656-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics