The SCEAS System
Navigation Menu

Conferences in DBLP

Financial Cryptography (fc)
2003 (conf/fc/2003)

  1. Simon N. Foley
    Using Trust Management to Support Transferable Hash-Based Micropayments. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:1-14 [Conf]
  2. Markus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán
    A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:15-33 [Conf]
  3. Matthieu Gaud, Jacques Traoré
    On the Anonymity of Fair Offline E-cash Systems. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:34-50 [Conf]
  4. Shouhuai Xu, Moti Yung
    Retrofitting Fairness on the Original RSA-Based E-cash. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:51-68 [Conf]
  5. Nicko van Someren, Andrew M. Odlyzko, Ronald L. Rivest, Tim Jones, Duncan Goldie-Scot
    Does Anyone Really Need MicroPayments? [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:69-76 [Conf]
  6. Andrew M. Odlyzko
    The Case Against Micropayments. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:77-83 [Conf]
  7. Alessandro Acquisti, Roger Dingledine, Paul F. Syverson
    On the Economics of Anonymity. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:84-102 [Conf]
  8. Ari Juels, Ravikanth Pappu
    Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:103-121 [Conf]
  9. Stuart E. Schechter, Michael D. Smith
    How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:122-137 [Conf]
  10. Jacques Stern, Julien P. Stern
    Cryptanalysis of the OTM Signature Scheme from FC'02. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:138-148 [Conf]
  11. Dennis Kügler
    "Man in the Middle" Attacks on Bluetooth. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:149-161 [Conf]
  12. Johannes Blömer, Jean-Pierre Seifert
    Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:162-181 [Conf]
  13. Andrew M. Odlyzko
    Economics, Psychology, and Sociology of Security. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:182-189 [Conf]
  14. Juan A. Garay, Carl Pomerance
    Timed Fair Exchange of Standard Signatures: [Extended Abstract]. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:190-207 [Conf]
  15. Holger Vogt
    Asynchronous Optimistic Fair Exchange Based on Revocable Items. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:208-222 [Conf]
  16. Felix Brandt
    Fully Private Auctions in a Constant Number of Rounds. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:223-238 [Conf]
  17. Koutarou Suzuki, Makoto Yokoo
    Secure Generalized Vickrey Auction Using Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:239-249 [Conf]
  18. Moti Yung
    Trusted Computing Platforms: The Good, the Bad, and the Ugly. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:250-254 [Conf]
  19. Dirk Kuhlmann
    On TCPA. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:255-269 [Conf]
  20. Yaron Sella
    On The Computation-Storage Trade-Offs of Hash Chain Traversal. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:270-285 [Conf]
  21. Javier Herranz, Germán Sáez
    Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:286-302 [Conf]
  22. Aggelos Kiayias, Moti Yung
    Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:303-320 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002