default search action
Search dblp for Publications
export results for "toc:db/conf/fc/fc2005.bht:"
@inproceedings{DBLP:conf/fc/AbdallaP05, author = {Michel Abdalla and David Pointcheval}, editor = {Andrew S. Patrick and Moti Yung}, title = {Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {341--356}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_31}, doi = {10.1007/11507840\_31}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/AbdallaP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AtallahFGT05, author = {Mikhail J. Atallah and Keith B. Frikken and Michael T. Goodrich and Roberto Tamassia}, editor = {Andrew S. Patrick and Moti Yung}, title = {Secure Biometric Authentication for Weak Computational Devices}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {357--371}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_32}, doi = {10.1007/11507840\_32}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/AtallahFGT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Avoine05, author = {Gildas Avoine}, editor = {Andrew S. Patrick and Moti Yung}, title = {Fraud Within Asymmetric Multi-hop Cellular Networks}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {1--15}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_1}, doi = {10.1007/11507840\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Avoine05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AvoineO05, author = {Gildas Avoine and Philippe Oechslin}, editor = {Andrew S. Patrick and Moti Yung}, title = {{RFID} Traceability: {A} Multilayer Problem}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {125--140}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_14}, doi = {10.1007/11507840\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/AvoineO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BaggaM05, author = {Walid Bagga and Refik Molva}, editor = {Andrew S. Patrick and Moti Yung}, title = {Policy-Based Cryptography and Applications}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {72--87}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_7}, doi = {10.1007/11507840\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BaggaM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BrandtS05, author = {Felix Brandt and Tuomas Sandholm}, editor = {Andrew S. Patrick and Moti Yung}, title = {Efficient Privacy-Preserving Protocols for Multi-unit Auctions}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {298--312}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_26}, doi = {10.1007/11507840\_26}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BrandtS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChenESSS05, author = {Liqun Chen and Matthias Enzmann and Ahmad{-}Reza Sadeghi and Markus Schneider and Michael Steiner}, editor = {Andrew S. Patrick and Moti Yung}, title = {A Privacy-Protecting Coupon System}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {93--108}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_12}, doi = {10.1007/11507840\_12}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChenESSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Clayton05, author = {Richard Clayton}, editor = {Andrew S. Patrick and Moti Yung}, title = {Who'd Phish from the Summit of Kilimanjaro?}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {91--92}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_11}, doi = {10.1007/11507840\_11}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/Clayton05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ClaytonDJMSS05, author = {Richard Clayton and Drew Dean and Markus Jakobsson and Steven A. Myers and Stuart G. Stubblebine and Michael Szydlo}, editor = {Andrew S. Patrick and Moti Yung}, title = {A Chat at the Old Phishin' Hole}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {88}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_8}, doi = {10.1007/11507840\_8}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ClaytonDJMSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CrescenzoGGA05, author = {Giovanni Di Crescenzo and R. F. Graveman and Renwei Ge and Gonzalo R. Arce}, editor = {Andrew S. Patrick and Moti Yung}, title = {Approximate Message Authentication and Biometric Entity Authentication}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {240--254}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_22}, doi = {10.1007/11507840\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/CrescenzoGGA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DagonLL05, author = {David Dagon and Wenke Lee and Richard J. Lipton}, editor = {Andrew S. Patrick and Moti Yung}, title = {Protecting Secret Data from Insider Attacks}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {16--30}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_2}, doi = {10.1007/11507840\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/DagonLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DodisY05, author = {Yevgeniy Dodis and Dae Hyun Yum}, editor = {Andrew S. Patrick and Moti Yung}, title = {Time Capsule Signature}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {57--71}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_6}, doi = {10.1007/11507840\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/DodisY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Eilebrecht05, author = {Lars Eilebrecht}, editor = {Andrew S. Patrick and Moti Yung}, title = {Ciphire Mail Email Encryption and Authentication}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {211--224}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_20}, doi = {10.1007/11507840\_20}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Eilebrecht05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ElkindL05, author = {Edith Elkind and Helger Lipmaa}, editor = {Andrew S. Patrick and Moti Yung}, title = {Small Coalitions Cannot Manipulate Voting}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {285--297}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_25}, doi = {10.1007/11507840\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ElkindL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Friedman05, author = {Allan Friedman}, editor = {Andrew S. Patrick and Moti Yung}, title = {Panel Summary: Incentives, Markets and Information Security}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {372--373}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_33}, doi = {10.1007/11507840\_33}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Friedman05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FrikkenA05, author = {Keith B. Frikken and Mikhail J. Atallah}, editor = {Andrew S. Patrick and Moti Yung}, title = {Achieving Fairness in Private Contract Negotiation}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {270--284}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_24}, doi = {10.1007/11507840\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/FrikkenA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GarfinkelSNMM05, author = {Simson L. Garfinkel and Jeffrey I. Schiller and Erik Nordlander and David Margrave and Robert C. Miller}, editor = {Andrew S. Patrick and Moti Yung}, title = {Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {188--202}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_18}, doi = {10.1007/11507840\_18}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/GarfinkelSNMM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Gavish05, author = {Bezalel Gavish}, editor = {Andrew S. Patrick and Moti Yung}, title = {Trust and Swindling on the Internet}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {44}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_4}, doi = {10.1007/11507840\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Gavish05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GentryRS05, author = {Craig Gentry and Zulfikar Ramzan and Stuart G. Stubblebine}, editor = {Andrew S. Patrick and Moti Yung}, title = {Secure Distributed \emph{Human} Computation}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {328--332}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_28}, doi = {10.1007/11507840\_28}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/GentryRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GodinezHM05, author = {Fernando God{\'{\i}}nez and Dieter Hutter and Ra{\'{u}}l Monroy}, editor = {Andrew S. Patrick and Moti Yung}, title = {Audit File Reduction Using N-Gram Models}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {336--340}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_30}, doi = {10.1007/11507840\_30}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/GodinezHM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GohG05, author = {Eu{-}Jin Goh and Philippe Golle}, editor = {Andrew S. Patrick and Moti Yung}, title = {Event Driven Private Counters}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {313--327}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_27}, doi = {10.1007/11507840\_27}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/GohG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Jakobsson05, author = {Markus Jakobsson}, editor = {Andrew S. Patrick and Moti Yung}, title = {Modeling and Preventing Phishing Attacks}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {89}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_9}, doi = {10.1007/11507840\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Jakobsson05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JareckiS05, author = {Stanislaw Jarecki and Vitaly Shmatikov}, editor = {Andrew S. Patrick and Moti Yung}, title = {Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {172--187}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_17}, doi = {10.1007/11507840\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/JareckiS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KiayiasM05, author = {Aggelos Kiayias and Antonina Mitrofanova}, editor = {Andrew S. Patrick and Moti Yung}, title = {Testing Disjointness of Private Datasets}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {109--124}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_13}, doi = {10.1007/11507840\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KiayiasM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KingS05, author = {Jeff King and Andr{\'{e}} L. M. dos Santos}, editor = {Andrew S. Patrick and Moti Yung}, title = {A User-Friendly Approach to Human Authentication of Messages}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {225--239}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_21}, doi = {10.1007/11507840\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KingS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Koyfman05, author = {Andrew Koyfman}, editor = {Andrew S. Patrick and Moti Yung}, title = {Securing Sensitive Data with the Ingrian DataSecure Platform}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {203--210}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_19}, doi = {10.1007/11507840\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Koyfman05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MukhamedovKR05, author = {Aybek Mukhamedov and Steve Kremer and Eike Ritter}, editor = {Andrew S. Patrick and Moti Yung}, title = {Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {255--269}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_23}, doi = {10.1007/11507840\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MukhamedovKR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Myers05, author = {Steven A. Myers}, editor = {Andrew S. Patrick and Moti Yung}, title = {Helping the Phish Detect the Lure}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {90}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_10}, doi = {10.1007/11507840\_10}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Myers05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/OorschotS05, author = {Paul C. van Oorschot and Stuart G. Stubblebine}, editor = {Andrew S. Patrick and Moti Yung}, title = {Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {31--43}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_3}, doi = {10.1007/11507840\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/OorschotS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SuzukiY05, author = {Koutarou Suzuki and Makoto Yokoo}, editor = {Andrew S. Patrick and Moti Yung}, title = {Secure Multi-attribute Procurement Auction}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {333--335}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_29}, doi = {10.1007/11507840\_29}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/SuzukiY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Szydlo05, author = {Michael Szydlo}, editor = {Andrew S. Patrick and Moti Yung}, title = {Risk Assurance for Hedge Funds Using Zero Knowledge Proofs}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {156--171}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_16}, doi = {10.1007/11507840\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Szydlo05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/TuylsSSAO05, author = {Pim Tuyls and Boris Skoric and S. Stallinga and Anton H. M. Akkermans and W. Ophey}, editor = {Andrew S. Patrick and Moti Yung}, title = {Information-Theoretic Security Analysis of Physical Uncloneable Functions}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {141--155}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_15}, doi = {10.1007/11507840\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/TuylsSSAO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ZhangSM05, author = {Fangguo Zhang and Willy Susilo and Yi Mu}, editor = {Andrew S. Patrick and Moti Yung}, title = {Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures)}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {45--56}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_5}, doi = {10.1007/11507840\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/ZhangSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2005, editor = {Andrew S. Patrick and Moti Yung}, title = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b137875}, doi = {10.1007/B137875}, isbn = {3-540-26656-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.