The SCEAS System
Navigation Menu

Conferences in DBLP

Financial Cryptography (fc)
2000 (conf/fc/2000)

  1. Moni Naor, Benny Pinkas
    Efficient Trace and Revoke Schemes. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:1-20 [Conf]
  2. Francis Zane
    Efficient Watermark Detection and Collusion Security. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:21-32 [Conf]
  3. Pamela Samuelson
    Towards More Sensible Anti-circumvention Regulations. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:33-41 [Conf]
  4. Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Self-Escrowed Cash against User Blackmailing. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:42-52 [Conf]
  5. Tomas Sander, Amnon Ta-Shma, Moti Yung
    Blind, Auditable Membership Proofs. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:53-71 [Conf]
  6. Giovanni Di Crescenzo
    Private Selective Payment Protocols. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:72-89 [Conf]
  7. Pierre-Alain Fouque, Guillaume Poupard, Jacques Stern
    Sharing Decryption in the Context of Voting or Lotteries. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:90-104 [Conf]
  8. Leon A. Pintsov, Scott A. Vanstone
    Postal Revenue Collection in the Digital Age. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:105-120 [Conf]
  9. David Naccache, Jacques Stern
    Signing on a Postcard. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:121-135 [Conf]
  10. Moti Yung
    Payment Systems: The Next Generation. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:136-139 [Conf]
  11. Els Van Herreweghen
    Non-repudiation in SET: Open Issues. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:140-156 [Conf]
  12. Jean-Sébastien Coron, Paul C. Kocher, David Naccache
    Statistics and Secret Leakage. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:157-173 [Conf]
  13. Vitaly Shmatikov, John C. Mitchell
    Analysis of Abuse-Free Contract Signing. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:174-191 [Conf]
  14. David M'Raïhi, David Naccache, Michael Tunstall
    Asymmetric Currency Rounding. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:192-201 [Conf]
  15. Barak D. Jolish
    The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:202-224 [Conf]
  16. Apollònia Martínez Nadal, Josep Lluís Ferrer-Gomila
    Critical Comments on the European Directive on a Common Framework for Electronic Signatures and Certification Service Providers. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:225-244 [Conf]
  17. Patrick Drew McDaniel, Aviel D. Rubin
    A Response to ''Can We Eliminate Certificate Revocation Lists?''. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:245-258 [Conf]
  18. David Pointcheval
    Self-Scrambling Anonymizers. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:259-275 [Conf]
  19. Stuart G. Stubblebine, Paul F. Syverson
    Authentic Attributes with Fine-Grained Anonymity Protection. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:276-294 [Conf]
  20. Ben Handley
    Resource-Efficient Anonymous Group Identification. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:295-312 [Conf]
  21. Jaap-Henk Hoepman
    Secret Key Authentication with Software-Only Verification. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:313-326 [Conf]
  22. Barbara Fox, Brian A. LaMacchia
    Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else? [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:327-331 [Conf]
  23. Ian Grigg
    Financial Cryptography in 7 Layers. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:332-348 [Conf]
  24. Mark S. Miller, Chip Morningstar, Bill Frantz
    Capability-Based Financial Instruments. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2000, pp:349-378 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002