Conferences in DBLP
Jack R. Selby Analyzing the Success and Failure of Recent e-Payment Schemes (Abstract). [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:1- [Conf ] Ronald L. Rivest Peppercoin Micropayments. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:2-8 [Conf ] Craig Gentry , Zulfikar Ramzan Microcredits for Verifiable Foreign Service Provider Metering. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:9-23 [Conf ] Matthias Enzmann , Marc Fischlin , Markus Schneider 0002 A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:24-38 [Conf ] Stuart G. Stubblebine , Paul C. van Oorschot Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract). [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:39-53 [Conf ] Lawrence O'Gorman , Amit Bagga , Jon Louis Bentley Call Center Customer Verification by Query-Directed Passwords. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:54-67 [Conf ] Jacques Stern Cryptography and the French Banking Cards: Past, Present, Future. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:68-69 [Conf ] Simon Pugh PayPass Security and Risk (Abstract). [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:70-71 [Conf ] Aggelos Kiayias , Moti Yung The Vector-Ballot e-Voting Approach. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:72-89 [Conf ] Jens Groth Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:90-104 [Conf ] Andrew S. Patrick Usability and Acceptability of Biometric Security Systems. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:105- [Conf ] L. Jean Camp Mental Models of Computer Security. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:106-111 [Conf ] William Yurcik Visualization Tools for Security Administrators. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:112-113 [Conf ] Ka-Ping Yee Secure Interaction Design. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:114-115 [Conf ] Jon M. Peha Bringing Payment Technology to the Unbanked (Abstract). [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:116- [Conf ] Edith Elkind , Helger Lipmaa Interleaving Cryptography and Mechanism Design: The Case of Online Auctions. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:117-131 [Conf ] Makoto Yokoo , Koutarou Suzuki Secure Generalized Vickrey Auction without Third-party Servers. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:132-146 [Conf ] Elisavet Konstantinou , Vasiliki Liagkou , Paul G. Spirakis , Yannis C. Stamatiou , Moti Yung Electronic National Lotteries. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:147-163 [Conf ] Giuseppe Ateniese , Breno de Medeiros Identity-Based Chameleon Hash and Applications. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:164-180 [Conf ] Vanessa Teague Selecting Correlated Random Actions. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:181-195 [Conf ] Giuseppe Persiano , Ivan Visconti An Efficient and Usable Multi-show Non-transferable Anonymous Credential System. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:196-211 [Conf ] Jaap-Henk Hoepman The Ephemeral Pairing Problem. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:212-226 [Conf ] Nick Mathewson , Roger Dingledine Mixminion: Strong Anonymity for Financial Cryptography. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:227-232 [Conf ] Marc Rennhard , Bernhard Plattner Practical Anonymity for the Masses with MorphMix. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:233-250 [Conf ] Brian Neil Levine , Michael K. Reiter , Chenxi Wang , Matthew Wright Timing Attacks in Low-Latency Mix Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:251-265 [Conf ] Ron Berman , Amos Fiat , Amnon Ta-Shma Provable Unlinkability against Traffic Analysis. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:266-280 [Conf ]