The SCEAS System
Navigation Menu

Conferences in DBLP

Financial Cryptography (fc)
2002 (conf/fc/2002)

  1. Dahlia Malkhi, Ofer Margo, Elan Pavlov
    E-Voting Without 'Cryptography'. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:1-15 [Conf]
  2. Jun Furukawa, Hiroshi Miyauchi, Kengo Mori, Satoshi Obana, Kazue Sako
    An Implementation of a Universally Verifiable Electronic Voting Scheme based on Shuffling. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:16-30 [Conf]
  3. Markus Jakobsson
    Financial Instruments in Recommendation Mechanisms. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:31-43 [Conf]
  4. Koutarou Suzuki, Makoto Yokoo
    Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:44-56 [Conf]
  5. Kazumasa Omote, Atsuko Miyaji
    A Second-price Sealed-bid Auction with the Discriminant of the p0-th Root. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:57-71 [Conf]
  6. Ari Juels, Michael Szydlo
    A Two-Server, Sealed-Bid Auction Protocol. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:72-86 [Conf]
  7. Helger Lipmaa, N. Asokan, Valtteri Niemi
    Secure Vickrey Auctions without Threshold Trust. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:87-101 [Conf]
  8. Don Coppersmith, Markus Jakobsson
    Almost Optimal Hash Sequence Traversal. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:102-119 [Conf]
  9. Philippe Golle, Stanislaw Jarecki, Ilya Mironov
    Cryptographic Primitives Enforcing Communication and Storage Complexity. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:120-135 [Conf]
  10. Pierre-Alain Fouque, Jacques Stern, Jan-Geert Wackers
    CryptoComputing with Rationals. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:136-146 [Conf]
  11. Rebecca N. Wright, L. Jean Camp, Ian Goldberg, Ronald L. Rivest, Graham Wood
    Privacy Tradeoffs: Myth or Reality? Panel. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:147-151 [Conf]
  12. Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji
    An Improved Fast Signature Scheme without Online Multiplication. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:152-167 [Conf]
  13. Juan A. Garay, Markus Jakobsson
    Timed Release of Standard Digital Signatures. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:168-182 [Conf]
  14. Giuseppe Ateniese, Dawn Xiaodong Song, Gene Tsudik
    Quasi-Efficient Revocation in Group Signatures. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:183-197 [Conf]
  15. Shouhuai Xu, Moti Yung
    The Dark Side of Threshold Cryptography. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:198-219 [Conf]
  16. Daniel E. Geer Jr., Moti Yung
    Split-and-Delegate: Threshold Cryptography for the Masses. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:220-237 [Conf]
  17. Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang
    Redistribution of Mechanical Secret Shares. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:238-252 [Conf]
  18. Roger Dingledine, Paul F. Syverson
    Reliable MIX Cascade Networks through Reputation. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:253-268 [Conf]
  19. Dennis Kügler, Holger Vogt
    Offline Payments with Auditable Tracing. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:269-281 [Conf]
  20. John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Vassilis Prevelakis
    Fileteller: Paying and Getting Paid for File Storage. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:282-299 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002