Conferences in DBLP
George I. Davida , Yair Frankel , Yiannis Tsiounis , Moti Yung Anonymity Control in E-Cash Systems. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:1-16 [Conf ] Eran Gabber , Phillip B. Gibbons , Yossi Matias , Alain J. Mayer How to Make Personalized Web Browising Simple, Secure, and Anonymous. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:17-32 [Conf ] Jim McCoy Anonymous Networking and Virtual Intranets: Tools for Anonymous Corporations. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:33-38 [Conf ] Paul F. Syverson , Stuart G. Stubblebine , David M. Goldschlag Unlinkable Serial Transactions. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:39-56 [Conf ] Cristian Radu , René Govaerts , Joos Vandewalle Efficient Electronic Cash with Restricted Privacy. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:57-70 [Conf ] Yuliang Zheng The SPEED Cipher. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:71-90 [Conf ] Simon L. Lelieveldt Evaluating the Security of Electronic Money. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:91-94 [Conf ] David G. W. Birch , Neil A. McEvoy Electronic Cash - Technology Will Denationalise Money. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:95-108 [Conf ] David Paul Maher Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:109-122 [Conf ] Louis C. Guillou Some Critical Remarks on "Dynamic Data Authentication" as Specified in EMV'96. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:123-134 [Conf ] Nikolaus Lange Single-Chip Implementation of a Cryptosystem for Financial Applications. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:135-144 [Conf ] Ronald L. Rivest Perspectives on Financial Cryptography. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:145-150 [Conf ] Matthew K. Franklin , Dahlia Malkhi Auditable Metering with Lightweight Security. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:151-160 [Conf ] Jacques Stern , Serge Vaudenay SVP: A Flexible Micropayment Scheme. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:161-172 [Conf ] Stanislaw Jarecki , Andrew M. Odlyzko An Efficient Micropayment System Based on Probabilistic Polling. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:173-192 [Conf ] Yacov Yacobi On the Continuum Between On-line and Off-line E-cash Systems - 1. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:193-202 [Conf ] Henning Pagnia , R. Jansen Towards Multiple-Payment Schemes for Digital Money. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:203-216 [Conf ] Markus Jakobsson , Moti Yung Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:217-238 [Conf ] Peter P. Swire The Uses and Limits of Financial Cryptography: A Law Professor's Perspective. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:239-258 [Conf ] Edward J. Radlo Legal Issues in Cryptography. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:259-286 [Conf ] A. Michael Froomkin Digital Signatures Today. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:287-290 [Conf ] Charles R. Merrill An Attorney's Roadmap to the Digital Signature Guidelines. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:291-298 [Conf ] Benjamin Wright Alternative Visions for Legal Signatures and Evidence. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:299-300 [Conf ] Peter C. Wayner Money Laundering: Past, Present and Future. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:301-306 [Conf ] Ronald L. Rivest Electronic Lottery Tickets as Micropayments. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:307-314 [Conf ] Paul Lampru Strategic Tasks for Government in the Information Age. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:315-328 [Conf ] Ian Grigg , Christopher C. Petro Using Electronic Markets to Achieve Efficient Task Distribution. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:329-339 [Conf ] Theodore C. Goldstein The Gateway Security Model in the Java Electronic Commerce Framework. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:340-354 [Conf ] David W. Kravitz Highly Scalable On-line Payments Via Task Decoupling. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:355-374 [Conf ] Barbara Fox , Brian Beckman , Daniel R. Simon GUMP: Grand Unified Meta-Protocols Recipes for Simple, Standards-Based Financial Cryptography. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:375-394 [Conf ] Bernhard Esslinger , Jürgen Schneider Secure Netword Communications and Secure Store & Forward Mechanisms with the SAP R/3 System. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:395-407 [Conf ]