The SCEAS System
Navigation Menu

Conferences in DBLP

Financial Cryptography (fc)
2004 (conf/fc/2004)

  1. Jack R. Selby
    Analyzing the Success and Failure of Recent e-Payment Schemes (Abstract). [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:1- [Conf]
  2. Ronald L. Rivest
    Peppercoin Micropayments. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:2-8 [Conf]
  3. Craig Gentry, Zulfikar Ramzan
    Microcredits for Verifiable Foreign Service Provider Metering. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:9-23 [Conf]
  4. Matthias Enzmann, Marc Fischlin, Markus Schneider 0002
    A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:24-38 [Conf]
  5. Stuart G. Stubblebine, Paul C. van Oorschot
    Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:39-53 [Conf]
  6. Lawrence O'Gorman, Amit Bagga, Jon Louis Bentley
    Call Center Customer Verification by Query-Directed Passwords. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:54-67 [Conf]
  7. Jacques Stern
    Cryptography and the French Banking Cards: Past, Present, Future. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:68-69 [Conf]
  8. Simon Pugh
    PayPass Security and Risk (Abstract). [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:70-71 [Conf]
  9. Aggelos Kiayias, Moti Yung
    The Vector-Ballot e-Voting Approach. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:72-89 [Conf]
  10. Jens Groth
    Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:90-104 [Conf]
  11. Andrew S. Patrick
    Usability and Acceptability of Biometric Security Systems. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:105- [Conf]
  12. L. Jean Camp
    Mental Models of Computer Security. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:106-111 [Conf]
  13. William Yurcik
    Visualization Tools for Security Administrators. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:112-113 [Conf]
  14. Ka-Ping Yee
    Secure Interaction Design. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:114-115 [Conf]
  15. Jon M. Peha
    Bringing Payment Technology to the Unbanked (Abstract). [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:116- [Conf]
  16. Edith Elkind, Helger Lipmaa
    Interleaving Cryptography and Mechanism Design: The Case of Online Auctions. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:117-131 [Conf]
  17. Makoto Yokoo, Koutarou Suzuki
    Secure Generalized Vickrey Auction without Third-party Servers. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:132-146 [Conf]
  18. Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung
    Electronic National Lotteries. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:147-163 [Conf]
  19. Giuseppe Ateniese, Breno de Medeiros
    Identity-Based Chameleon Hash and Applications. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:164-180 [Conf]
  20. Vanessa Teague
    Selecting Correlated Random Actions. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:181-195 [Conf]
  21. Giuseppe Persiano, Ivan Visconti
    An Efficient and Usable Multi-show Non-transferable Anonymous Credential System. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:196-211 [Conf]
  22. Jaap-Henk Hoepman
    The Ephemeral Pairing Problem. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:212-226 [Conf]
  23. Nick Mathewson, Roger Dingledine
    Mixminion: Strong Anonymity for Financial Cryptography. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:227-232 [Conf]
  24. Marc Rennhard, Bernhard Plattner
    Practical Anonymity for the Masses with MorphMix. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:233-250 [Conf]
  25. Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew Wright
    Timing Attacks in Low-Latency Mix Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:251-265 [Conf]
  26. Ron Berman, Amos Fiat, Amnon Ta-Shma
    Provable Unlinkability against Traffic Analysis. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:266-280 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002