The SCEAS System
Navigation Menu

Conferences in DBLP

Financial Cryptography (fc)
1999 (conf/fc/1999)

  1. Neil Daswani, Dan Boneh
    Experimenting with Electronic Commerce on the PalmPilot. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:1-16 [Conf]
  2. Hugo Krawczyk
    Blinding of Credit Card Numbers in the SET Protocol. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:17-28 [Conf]
  3. Ari Juels
    Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:29-45 [Conf]
  4. Tomas Sander, Amnon Ta-Shma
    Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:46-61 [Conf]
  5. Yacov Yacobi
    Risk Management for E-Cash Systems with Partial Real-Time Audit. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:62-71 [Conf]
  6. Kazuo J. Ezawa, Gregory Napiorkowski, Mariusz Kossarski
    Assessment of Effectiveness of Counterfeit Transaction Detection Systems for Smart Card Based Electronic Cash. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:72-85 [Conf]
  7. Reto Kohlas, Ueli M. Maurer
    Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:86-103 [Conf]
  8. Barbara Fox, Brian A. LaMacchia
    Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:104-117 [Conf]
  9. Adi Shamir, Nicko van Someren
    Playing "Hide and Seek" with Stored Keys. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:118-124 [Conf]
  10. Markus Breitbach, Hideki Imai
    On Channel Capacity and Modulation of Watermarks in Digital Still Images. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:125-139 [Conf]
  11. Michel Abdalla, Yuval Shavitt, Avishai Wool
    Towards Making Broadcast Encryption Practical. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:140-157 [Conf]
  12. David W. Kravitz, David M. Goldschlag
    Conditional Access Concepts and Principles. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:158-172 [Conf]
  13. Jon Callas, Joan Feigenbaum, David M. Goldschlag, Erin Sawyer
    Fair Use, Intellectual Property, and the Information Economy (Panel Session Summary). [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:173-183 [Conf]
  14. Stuart E. Schechter, Todd Parnell, Alexander J. Hartemink
    Anonymous Authentication of Membership in Dynamic Groups. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:184-195 [Conf]
  15. Giuseppe Ateniese, Gene Tsudik
    Some Open Issues and New Directions in Group Signatures. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:196-211 [Conf]
  16. Philip D. MacKenzie, Jeffrey S. Sorensen
    Anonymous Investing: Hiding the Identities of Stockholders. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:212-229 [Conf]
  17. Stuart G. Stubblebine, Paul F. Syverson
    Fair On-Line Auctions without Special Trusted Parties. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:230-240 [Conf]
  18. Yair Frankel, Moti Yung
    Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control". [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:241-252 [Conf]
  19. Markus Jakobsson, Joy Müller
    Improved Magic Ink Signatures Using Hints. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:253-268 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002