The SCEAS System
Navigation Menu

Conferences in DBLP

Financial Cryptography (fc)
2005 (conf/fc/2005)

  1. Gildas Avoine
    Fraud Within Asymmetric Multi-hop Cellular Networks. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:1-15 [Conf]
  2. David Dagon, Wenke Lee, Richard J. Lipton
    Protecting Secret Data from Insider Attacks. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:16-30 [Conf]
  3. Paul C. van Oorschot, Stuart G. Stubblebine
    Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:31-43 [Conf]
  4. Bezalel Gavish
    Trust and Swindling on the Internet. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:44- [Conf]
  5. Fangguo Zhang, Willy Susilo, Yi Mu
    Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:45-56 [Conf]
  6. Yevgeniy Dodis, Dae Hyun Yum
    Time Capsule Signature. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:57-71 [Conf]
  7. Walid Bagga, Refik Molva
    Policy-Based Cryptography and Applications. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:72-87 [Conf]
  8. Richard Clayton, Drew Dean, Markus Jakobsson, Steven Myers, Stuart G. Stubblebine, Michael Szydlo
    A Chat at the Old Phishin' Hole. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:88- [Conf]
  9. Markus Jakobsson
    Modeling and Preventing Phishing Attacks. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:89- [Conf]
  10. Steven Myers
    Helping the Phish Detect the Lure. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:90- [Conf]
  11. Richard Clayton
    Who'd Phish from the Summit of Kilimanjaro?. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:91-92 [Conf]
  12. Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider 0002, Michael Steiner
    A Privacy-Protecting Coupon System. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:93-108 [Conf]
  13. Aggelos Kiayias, Antonina Mitrofanova
    Testing Disjointness of Private Datasets. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:109-124 [Conf]
  14. Gildas Avoine, Philippe Oechslin
    RFID Traceability: A Multilayer Problem. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:125-140 [Conf]
  15. Pim Tuyls, Boris Skoric, S. Stallinga, Anton H. M. Akkermans, W. Ophey
    Information-Theoretic Security Analysis of Physical Uncloneable Functions. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:141-155 [Conf]
  16. Michael Szydlo
    Risk Assurance for Hedge Funds Using Zero Knowledge Proofs. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:156-171 [Conf]
  17. Stanislaw Jarecki, Vitaly Shmatikov
    Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:172-187 [Conf]
  18. Simson L. Garfinkel, Jeffrey I. Schiller, Erik Nordlander, David Margrave, Robert C. Miller
    Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:188-202 [Conf]
  19. Andrew Koyfman
    Securing Sensitive Data with the Ingrian DataSecure Platform. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:203-210 [Conf]
  20. Lars Eilebrecht
    Ciphire Mail Email Encryption and Authentication. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:211-224 [Conf]
  21. Jeff King, André L. M. dos Santos
    A User-Friendly Approach to Human Authentication of Messages. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:225-239 [Conf]
  22. Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, Gonzalo R. Arce
    Approximate Message Authentication and Biometric Entity Authentication. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:240-254 [Conf]
  23. Aybek Mukhamedov, Steve Kremer, Eike Ritter
    Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:255-269 [Conf]
  24. Keith B. Frikken, Mikhail J. Atallah
    Achieving Fairness in Private Contract Negotiation. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:270-284 [Conf]
  25. Edith Elkind, Helger Lipmaa
    Small Coalitions Cannot Manipulate Voting. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:285-297 [Conf]
  26. Felix Brandt, Tuomas Sandholm
    Efficient Privacy-Preserving Protocols for Multi-unit Auctions. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:298-312 [Conf]
  27. Eu-Jin Goh, Philippe Golle
    Event Driven Private Counters. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:313-327 [Conf]
  28. Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine
    Secure Distributed Human Computation. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:328-332 [Conf]
  29. Koutarou Suzuki, Makoto Yokoo
    Secure Multi-attribute Procurement Auction. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:333-335 [Conf]
  30. Fernando Godínez, Dieter Hutter, Raul Monroy
    Audit File Reduction Using N-Gram Models. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:336-340 [Conf]
  31. Michel Abdalla, David Pointcheval
    Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:341-356 [Conf]
  32. Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia
    Secure Biometric Authentication for Weak Computational Devices. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:357-371 [Conf]
  33. Allan Friedman
    Panel Summary: Incentives, Markets and Information Security. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:372-373 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002