Conferences in DBLP
Neil Daswani , Dan Boneh Experimenting with Electronic Commerce on the PalmPilot. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:1-16 [Conf ] Hugo Krawczyk Blinding of Credit Card Numbers in the SET Protocol. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:17-28 [Conf ] Ari Juels Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:29-45 [Conf ] Tomas Sander , Amnon Ta-Shma Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:46-61 [Conf ] Yacov Yacobi Risk Management for E-Cash Systems with Partial Real-Time Audit. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:62-71 [Conf ] Kazuo J. Ezawa , Gregory Napiorkowski , Mariusz Kossarski Assessment of Effectiveness of Counterfeit Transaction Detection Systems for Smart Card Based Electronic Cash. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:72-85 [Conf ] Reto Kohlas , Ueli M. Maurer Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:86-103 [Conf ] Barbara Fox , Brian A. LaMacchia Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:104-117 [Conf ] Adi Shamir , Nicko van Someren Playing "Hide and Seek" with Stored Keys. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:118-124 [Conf ] Markus Breitbach , Hideki Imai On Channel Capacity and Modulation of Watermarks in Digital Still Images. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:125-139 [Conf ] Michel Abdalla , Yuval Shavitt , Avishai Wool Towards Making Broadcast Encryption Practical. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:140-157 [Conf ] David W. Kravitz , David M. Goldschlag Conditional Access Concepts and Principles. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:158-172 [Conf ] Jon Callas , Joan Feigenbaum , David M. Goldschlag , Erin Sawyer Fair Use, Intellectual Property, and the Information Economy (Panel Session Summary). [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:173-183 [Conf ] Stuart E. Schechter , Todd Parnell , Alexander J. Hartemink Anonymous Authentication of Membership in Dynamic Groups. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:184-195 [Conf ] Giuseppe Ateniese , Gene Tsudik Some Open Issues and New Directions in Group Signatures. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:196-211 [Conf ] Philip D. MacKenzie , Jeffrey S. Sorensen Anonymous Investing: Hiding the Identities of Stockholders. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:212-229 [Conf ] Stuart G. Stubblebine , Paul F. Syverson Fair On-Line Auctions without Special Trusted Parties. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:230-240 [Conf ] Yair Frankel , Moti Yung Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control". [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:241-252 [Conf ] Markus Jakobsson , Joy Müller Improved Magic Ink Signatures Using Hints. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:253-268 [Conf ]