The SCEAS System
Navigation Menu

Conferences in DBLP

Financial Cryptography (fc)
2006 (conf/fc/2006)

  1. Bryan Parno, Cynthia Kuo, Adrian Perrig
    Phoolproof Phishing Prevention. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:1-19 [Conf]
  2. Mohammad Mannan, Paul C. van Oorschot
    A Protocol for Secure Public Instant Messaging. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:20-35 [Conf]
  3. C. Corzo, F. Corzo S., N. Zhang, A. Carpenter
    Using Automated Banking Certificates to Detect Unauthorised Financial Transactions. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:36-51 [Conf]
  4. Adam Barth, Dan Boneh, Brent Waters
    Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:52-64 [Conf]
  5. Philippe Golle
    A Private Stable Matching Algorithm. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:65-80 [Conf]
  6. Klaus Kursawe, Gregory Neven, Pim Tuyls
    Private Policy Negotiation. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:81-95 [Conf]
  7. Bogdan Carbunar, Radu Sion
    Uncheatable Reputation for Distributed Computation Markets. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:96-110 [Conf]
  8. Jun Furukawa, Kazue Sako
    An Efficient Publicly Verifiable Mix-Net for Long Inputs. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:111-125 [Conf]
  9. Jong Youl Choi, Philippe Golle, Markus Jakobsson
    Auditable Privacy: On Tamper-Evident Mix Networks. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:126-141 [Conf]
  10. Peter Bogetoft, Ivan Damgård, Thomas Jakobsen, Kurt Nielsen, Jakob Pagter, Tomas Toft
    A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:142-147 [Conf]
  11. Sébastien Canard, Matthieu Gaud, Jacques Traoré
    Defeating Malicious Servers in a Blind Signatures Based Voting System. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:148-153 [Conf]
  12. Yvo Desmedt, Tanja Lange
    Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:154-159 [Conf]
  13. Tyler Close
    Credit Transfer for Market-Based Infrastructure. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:160-165 [Conf]
  14. Michael Szydlo
    A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:166-170 [Conf]
  15. Gwenaëlle Martinet, Guillaume Poupard, Philippe Sola
    Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:171-176 [Conf]
  16. David Galindo, Javier Herranz
    A Generic Construction for Token-Controlled Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:177-190 [Conf]
  17. Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov
    Timed-Release and Key-Insulated Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:191-205 [Conf]
  18. Ian F. Blake, Vladimir Kolesnikov
    Conditional Encrypted Mapping and Comparing Encrypted Numbers. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:206-220 [Conf]
  19. Samad Nasserian, Gene Tsudik
    Revisiting Oblivious Signature-Based Envelopes. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:221-235 [Conf]
  20. Yoshikazu Hanatani, Yuichi Komano, Kazuo Ohta, Noboru Kunihiro
    Provably Secure Electronic Cash Based on Blind Multisignature Schemes. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:236-250 [Conf]
  21. Xiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo
    Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:251-265 [Conf]
  22. Lan Nguyen
    Privacy-Protecting Coupon System Revisited. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:266-280 [Conf]
  23. Yong Ho Hwang, Pil Joong Lee
    Efficient Broadcast Encryption Scheme with Log-Key Storage. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:281-295 [Conf]
  24. Mikhail J. Atallah, Marina Blanton, Keith B. Frikken, Jiangtao Li
    Efficient Correlated Action Selection. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:296-310 [Conf]
  25. Aggelos Kiayias, Moti Yung
    Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:311-325 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002