The SCEAS System
Navigation Menu

Conferences in DBLP

Financial Cryptography (fc)
1997 (conf/fc/1997)

  1. George I. Davida, Yair Frankel, Yiannis Tsiounis, Moti Yung
    Anonymity Control in E-Cash Systems. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:1-16 [Conf]
  2. Eran Gabber, Phillip B. Gibbons, Yossi Matias, Alain J. Mayer
    How to Make Personalized Web Browising Simple, Secure, and Anonymous. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:17-32 [Conf]
  3. Jim McCoy
    Anonymous Networking and Virtual Intranets: Tools for Anonymous Corporations. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:33-38 [Conf]
  4. Paul F. Syverson, Stuart G. Stubblebine, David M. Goldschlag
    Unlinkable Serial Transactions. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:39-56 [Conf]
  5. Cristian Radu, René Govaerts, Joos Vandewalle
    Efficient Electronic Cash with Restricted Privacy. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:57-70 [Conf]
  6. Yuliang Zheng
    The SPEED Cipher. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:71-90 [Conf]
  7. Simon L. Lelieveldt
    Evaluating the Security of Electronic Money. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:91-94 [Conf]
  8. David G. W. Birch, Neil A. McEvoy
    Electronic Cash - Technology Will Denationalise Money. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:95-108 [Conf]
  9. David Paul Maher
    Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:109-122 [Conf]
  10. Louis C. Guillou
    Some Critical Remarks on "Dynamic Data Authentication" as Specified in EMV'96. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:123-134 [Conf]
  11. Nikolaus Lange
    Single-Chip Implementation of a Cryptosystem for Financial Applications. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:135-144 [Conf]
  12. Ronald L. Rivest
    Perspectives on Financial Cryptography. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:145-150 [Conf]
  13. Matthew K. Franklin, Dahlia Malkhi
    Auditable Metering with Lightweight Security. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:151-160 [Conf]
  14. Jacques Stern, Serge Vaudenay
    SVP: A Flexible Micropayment Scheme. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:161-172 [Conf]
  15. Stanislaw Jarecki, Andrew M. Odlyzko
    An Efficient Micropayment System Based on Probabilistic Polling. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:173-192 [Conf]
  16. Yacov Yacobi
    On the Continuum Between On-line and Off-line E-cash Systems - 1. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:193-202 [Conf]
  17. Henning Pagnia, R. Jansen
    Towards Multiple-Payment Schemes for Digital Money. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:203-216 [Conf]
  18. Markus Jakobsson, Moti Yung
    Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:217-238 [Conf]
  19. Peter P. Swire
    The Uses and Limits of Financial Cryptography: A Law Professor's Perspective. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:239-258 [Conf]
  20. Edward J. Radlo
    Legal Issues in Cryptography. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:259-286 [Conf]
  21. A. Michael Froomkin
    Digital Signatures Today. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:287-290 [Conf]
  22. Charles R. Merrill
    An Attorney's Roadmap to the Digital Signature Guidelines. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:291-298 [Conf]
  23. Benjamin Wright
    Alternative Visions for Legal Signatures and Evidence. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:299-300 [Conf]
  24. Peter C. Wayner
    Money Laundering: Past, Present and Future. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:301-306 [Conf]
  25. Ronald L. Rivest
    Electronic Lottery Tickets as Micropayments. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:307-314 [Conf]
  26. Paul Lampru
    Strategic Tasks for Government in the Information Age. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:315-328 [Conf]
  27. Ian Grigg, Christopher C. Petro
    Using Electronic Markets to Achieve Efficient Task Distribution. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:329-339 [Conf]
  28. Theodore C. Goldstein
    The Gateway Security Model in the Java Electronic Commerce Framework. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:340-354 [Conf]
  29. David W. Kravitz
    Highly Scalable On-line Payments Via Task Decoupling. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:355-374 [Conf]
  30. Barbara Fox, Brian Beckman, Daniel R. Simon
    GUMP: Grand Unified Meta-Protocols Recipes for Simple, Standards-Based Financial Cryptography. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:375-394 [Conf]
  31. Bernhard Esslinger, Jürgen Schneider
    Secure Netword Communications and Secure Store & Forward Mechanisms with the SAP R/3 System. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:395-407 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002