


default search action
4th Financial Cryptography 2000: Anguilla, British West Indies
- Yair Frankel:

Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings. Lecture Notes in Computer Science 1962, Springer 2001, ISBN 3-540-42700-7
Digital Rights Management
- Moni Naor, Benny Pinkas:

Efficient Trace and Revoke Schemes. 1-20 - Francis Zane:

Efficient Watermark Detection and Collusion Security. 21-32
Invited Lecture (I)
- Pamela Samuelson:

Towards More Sensible Anti-circumvention Regulations. 33-41
Payment Systems
- Birgit Pfitzmann, Ahmad-Reza Sadeghi:

Self-Escrowed Cash against User Blackmailing. 42-52 - Tomas Sander, Amnon Ta-Shma

, Moti Yung:
Blind, Auditable Membership Proofs. 53-71 - Giovanni Di Crescenzo:

Private Selective Payment Protocols. 72-89
Financial Cryptography Tools (I)
- Pierre-Alain Fouque, Guillaume Poupard, Jacques Stern:

Sharing Decryption in the Context of Voting or Lotteries. 90-104
Electronic Postcards
- Leon A. Pintsov, Scott A. Vanstone:

Postal Revenue Collection in the Digital Age. 105-120 - David Naccache, Jacques Stern:

Signing on a Postcard. 121-135
Panel (I)
- Moti Yung:

Payment Systems: The Next Generation. 136-139
Abuses of Systems
- Els Van Herreweghen:

Non-repudiation in SET: Open Issues. 140-156 - Jean-Sébastien Coron, Paul C. Kocher, David Naccache:

Statistics and Secret Leakage. 157-173 - Vitaly Shmatikov, John C. Mitchell:

Analysis of Abuse-Free Contract Signing. 174-191 - David M'Raïhi, David Naccache, Michael Tunstall

:
Asymmetric Currency Rounding. 192-201
Financial Crypto Policies and Issues
- Barak D. Jolish:

The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel. 202-224 - Apollònia Martínez Nadal, Josep-Lluís Ferrer-Gomila

:
Critical Comments on the European Directive on a Common Framework for Electronic Signatures and Certification Service Providers. 225-244 - Patrick D. McDaniel, Aviel D. Rubin:

A Response to ''Can We Eliminate Certificate Revocation Lists?''. 245-258
Anonymity
- David Pointcheval

:
Self-Scrambling Anonymizers. 259-275 - Stuart G. Stubblebine, Paul F. Syverson:

Authentic Attributes with Fine-Grained Anonymity Protection. 276-294 - Ben Handley:

Resource-Efficient Anonymous Group Identification. 295-312
Financial Cryptography Tools (II)
- Jaap-Henk Hoepman:

Secret Key Authentication with Software-Only Verification. 313-326
Panel (II)
- Barbara Fox, Brian A. LaMacchia:

Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else? 327-331
System Architectures
- Ian Grigg:

Financial Cryptography in 7 Layers. 332-348 - Mark S. Miller, Chip Morningstar, Bill Frantz:

Capability-Based Financial Instruments. 349-378

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














