Conferences in DBLP
Moni Naor , Benny Pinkas Efficient Trace and Revoke Schemes. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:1-20 [Conf ] Francis Zane Efficient Watermark Detection and Collusion Security. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:21-32 [Conf ] Pamela Samuelson Towards More Sensible Anti-circumvention Regulations. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:33-41 [Conf ] Birgit Pfitzmann , Ahmad-Reza Sadeghi Self-Escrowed Cash against User Blackmailing. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:42-52 [Conf ] Tomas Sander , Amnon Ta-Shma , Moti Yung Blind, Auditable Membership Proofs. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:53-71 [Conf ] Giovanni Di Crescenzo Private Selective Payment Protocols. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:72-89 [Conf ] Pierre-Alain Fouque , Guillaume Poupard , Jacques Stern Sharing Decryption in the Context of Voting or Lotteries. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:90-104 [Conf ] Leon A. Pintsov , Scott A. Vanstone Postal Revenue Collection in the Digital Age. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:105-120 [Conf ] David Naccache , Jacques Stern Signing on a Postcard. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:121-135 [Conf ] Moti Yung Payment Systems: The Next Generation. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:136-139 [Conf ] Els Van Herreweghen Non-repudiation in SET: Open Issues. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:140-156 [Conf ] Jean-Sébastien Coron , Paul C. Kocher , David Naccache Statistics and Secret Leakage. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:157-173 [Conf ] Vitaly Shmatikov , John C. Mitchell Analysis of Abuse-Free Contract Signing. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:174-191 [Conf ] David M'Raïhi , David Naccache , Michael Tunstall Asymmetric Currency Rounding. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:192-201 [Conf ] Barak D. Jolish The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:202-224 [Conf ] Apollònia Martínez Nadal , Josep Lluís Ferrer-Gomila Critical Comments on the European Directive on a Common Framework for Electronic Signatures and Certification Service Providers. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:225-244 [Conf ] Patrick Drew McDaniel , Aviel D. Rubin A Response to ''Can We Eliminate Certificate Revocation Lists?''. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:245-258 [Conf ] David Pointcheval Self-Scrambling Anonymizers. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:259-275 [Conf ] Stuart G. Stubblebine , Paul F. Syverson Authentic Attributes with Fine-Grained Anonymity Protection. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:276-294 [Conf ] Ben Handley Resource-Efficient Anonymous Group Identification. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:295-312 [Conf ] Jaap-Henk Hoepman Secret Key Authentication with Software-Only Verification. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:313-326 [Conf ] Barbara Fox , Brian A. LaMacchia Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else? [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:327-331 [Conf ] Ian Grigg Financial Cryptography in 7 Layers. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:332-348 [Conf ] Mark S. Miller , Chip Morningstar , Bill Frantz Capability-Based Financial Instruments. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:349-378 [Conf ]