default search action
4th Financial Cryptography 2000: Anguilla, British West Indies
- Yair Frankel:
Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings. Lecture Notes in Computer Science 1962, Springer 2001, ISBN 3-540-42700-7
Digital Rights Management
- Moni Naor, Benny Pinkas:
Efficient Trace and Revoke Schemes. 1-20 - Francis Zane:
Efficient Watermark Detection and Collusion Security. 21-32
Invited Lecture (I)
- Pamela Samuelson:
Towards More Sensible Anti-circumvention Regulations. 33-41
Payment Systems
- Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Self-Escrowed Cash against User Blackmailing. 42-52 - Tomas Sander, Amnon Ta-Shma, Moti Yung:
Blind, Auditable Membership Proofs. 53-71 - Giovanni Di Crescenzo:
Private Selective Payment Protocols. 72-89
Financial Cryptography Tools (I)
- Pierre-Alain Fouque, Guillaume Poupard, Jacques Stern:
Sharing Decryption in the Context of Voting or Lotteries. 90-104
Electronic Postcards
- Leon A. Pintsov, Scott A. Vanstone:
Postal Revenue Collection in the Digital Age. 105-120 - David Naccache, Jacques Stern:
Signing on a Postcard. 121-135
Panel (I)
- Moti Yung:
Payment Systems: The Next Generation. 136-139
Abuses of Systems
- Els Van Herreweghen:
Non-repudiation in SET: Open Issues. 140-156 - Jean-Sébastien Coron, Paul C. Kocher, David Naccache:
Statistics and Secret Leakage. 157-173 - Vitaly Shmatikov, John C. Mitchell:
Analysis of Abuse-Free Contract Signing. 174-191 - David M'Raïhi, David Naccache, Michael Tunstall:
Asymmetric Currency Rounding. 192-201
Financial Crypto Policies and Issues
- Barak D. Jolish:
The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel. 202-224 - Apollònia Martínez Nadal, Josep Lluís Ferrer-Gomila:
Critical Comments on the European Directive on a Common Framework for Electronic Signatures and Certification Service Providers. 225-244 - Patrick D. McDaniel, Aviel D. Rubin:
A Response to ''Can We Eliminate Certificate Revocation Lists?''. 245-258
Anonymity
- David Pointcheval:
Self-Scrambling Anonymizers. 259-275 - Stuart G. Stubblebine, Paul F. Syverson:
Authentic Attributes with Fine-Grained Anonymity Protection. 276-294 - Ben Handley:
Resource-Efficient Anonymous Group Identification. 295-312
Financial Cryptography Tools (II)
- Jaap-Henk Hoepman:
Secret Key Authentication with Software-Only Verification. 313-326
Panel (II)
- Barbara Fox, Brian A. LaMacchia:
Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else? 327-331
System Architectures
- Ian Grigg:
Financial Cryptography in 7 Layers. 332-348 - Mark S. Miller, Chip Morningstar, Bill Frantz:
Capability-Based Financial Instruments. 349-378
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.