Conferences in DBLP
Simon N. Foley Using Trust Management to Support Transferable Hash-Based Micropayments. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:1-14 [Conf ] Markus Jakobsson , Jean-Pierre Hubaux , Levente Buttyán A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:15-33 [Conf ] Matthieu Gaud , Jacques Traoré On the Anonymity of Fair Offline E-cash Systems. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:34-50 [Conf ] Shouhuai Xu , Moti Yung Retrofitting Fairness on the Original RSA-Based E-cash. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:51-68 [Conf ] Nicko van Someren , Andrew M. Odlyzko , Ronald L. Rivest , Tim Jones , Duncan Goldie-Scot Does Anyone Really Need MicroPayments? [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:69-76 [Conf ] Andrew M. Odlyzko The Case Against Micropayments. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:77-83 [Conf ] Alessandro Acquisti , Roger Dingledine , Paul F. Syverson On the Economics of Anonymity. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:84-102 [Conf ] Ari Juels , Ravikanth Pappu Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:103-121 [Conf ] Stuart E. Schechter , Michael D. Smith How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:122-137 [Conf ] Jacques Stern , Julien P. Stern Cryptanalysis of the OTM Signature Scheme from FC'02. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:138-148 [Conf ] Dennis Kügler "Man in the Middle" Attacks on Bluetooth. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:149-161 [Conf ] Johannes Blömer , Jean-Pierre Seifert Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:162-181 [Conf ] Andrew M. Odlyzko Economics, Psychology, and Sociology of Security. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:182-189 [Conf ] Juan A. Garay , Carl Pomerance Timed Fair Exchange of Standard Signatures: [Extended Abstract]. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:190-207 [Conf ] Holger Vogt Asynchronous Optimistic Fair Exchange Based on Revocable Items. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:208-222 [Conf ] Felix Brandt Fully Private Auctions in a Constant Number of Rounds. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:223-238 [Conf ] Koutarou Suzuki , Makoto Yokoo Secure Generalized Vickrey Auction Using Homomorphic Encryption. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:239-249 [Conf ] Moti Yung Trusted Computing Platforms: The Good, the Bad, and the Ugly. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:250-254 [Conf ] Dirk Kuhlmann On TCPA. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:255-269 [Conf ] Yaron Sella On The Computation-Storage Trade-Offs of Hash Chain Traversal. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:270-285 [Conf ] Javier Herranz , Germán Sáez Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:286-302 [Conf ] Aggelos Kiayias , Moti Yung Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2003, pp:303-320 [Conf ]