|
Conferences in DBLP
- Dahlia Malkhi, Ofer Margo, Elan Pavlov
E-Voting Without 'Cryptography'. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:1-15 [Conf]
- Jun Furukawa, Hiroshi Miyauchi, Kengo Mori, Satoshi Obana, Kazue Sako
An Implementation of a Universally Verifiable Electronic Voting Scheme based on Shuffling. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:16-30 [Conf]
- Markus Jakobsson
Financial Instruments in Recommendation Mechanisms. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:31-43 [Conf]
- Koutarou Suzuki, Makoto Yokoo
Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:44-56 [Conf]
- Kazumasa Omote, Atsuko Miyaji
A Second-price Sealed-bid Auction with the Discriminant of the p0-th Root. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:57-71 [Conf]
- Ari Juels, Michael Szydlo
A Two-Server, Sealed-Bid Auction Protocol. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:72-86 [Conf]
- Helger Lipmaa, N. Asokan, Valtteri Niemi
Secure Vickrey Auctions without Threshold Trust. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:87-101 [Conf]
- Don Coppersmith, Markus Jakobsson
Almost Optimal Hash Sequence Traversal. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:102-119 [Conf]
- Philippe Golle, Stanislaw Jarecki, Ilya Mironov
Cryptographic Primitives Enforcing Communication and Storage Complexity. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:120-135 [Conf]
- Pierre-Alain Fouque, Jacques Stern, Jan-Geert Wackers
CryptoComputing with Rationals. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:136-146 [Conf]
- Rebecca N. Wright, L. Jean Camp, Ian Goldberg, Ronald L. Rivest, Graham Wood
Privacy Tradeoffs: Myth or Reality? Panel. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:147-151 [Conf]
- Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji
An Improved Fast Signature Scheme without Online Multiplication. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:152-167 [Conf]
- Juan A. Garay, Markus Jakobsson
Timed Release of Standard Digital Signatures. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:168-182 [Conf]
- Giuseppe Ateniese, Dawn Xiaodong Song, Gene Tsudik
Quasi-Efficient Revocation in Group Signatures. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:183-197 [Conf]
- Shouhuai Xu, Moti Yung
The Dark Side of Threshold Cryptography. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:198-219 [Conf]
- Daniel E. Geer Jr., Moti Yung
Split-and-Delegate: Threshold Cryptography for the Masses. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:220-237 [Conf]
- Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang
Redistribution of Mechanical Secret Shares. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:238-252 [Conf]
- Roger Dingledine, Paul F. Syverson
Reliable MIX Cascade Networks through Reputation. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:253-268 [Conf]
- Dennis Kügler, Holger Vogt
Offline Payments with Auditable Tracing. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:269-281 [Conf]
- John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Vassilis Prevelakis
Fileteller: Paying and Getting Paid for File Storage. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:282-299 [Conf]
|