


default search action
7th Financial Cryptography 2003: Guadeloupe, French West Indies
- Rebecca N. Wright:

Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers. Lecture Notes in Computer Science 2742, Springer 2003, ISBN 3-540-40663-8 - Simon N. Foley:

Using Trust Management to Support Transferable Hash-Based Micropayments. 1-14 - Markus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán:

A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. 15-33 - Matthieu Gaud, Jacques Traoré:

On the Anonymity of Fair Offline E-cash Systems. 34-50 - Shouhuai Xu, Moti Yung:

Retrofitting Fairness on the Original RSA-Based E-cash. 51-68 - Nicko van Someren, Andrew M. Odlyzko, Ronald L. Rivest, Tim Jones, Duncan Goldie-Scot:

Does Anyone Really Need MicroPayments? 69-76 - Andrew M. Odlyzko:

The Case Against Micropayments. 77-83 - Alessandro Acquisti, Roger Dingledine, Paul F. Syverson:

On the Economics of Anonymity. 84-102 - Ari Juels, Ravikanth Pappu:

Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. 103-121 - Stuart E. Schechter, Michael D. Smith:

How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. 122-137 - Jacques Stern, Julien P. Stern:

Cryptanalysis of the OTM Signature Scheme from FC'02. 138-148 - Dennis Kügler:

"Man in the Middle" Attacks on Bluetooth. 149-161 - Johannes Blömer, Jean-Pierre Seifert:

Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). 162-181 - Andrew M. Odlyzko:

Economics, Psychology, and Sociology of Security. 182-189 - Juan A. Garay, Carl Pomerance:

Timed Fair Exchange of Standard Signatures: [Extended Abstract]. 190-207 - Holger Vogt:

Asynchronous Optimistic Fair Exchange Based on Revocable Items. 208-222 - Felix Brandt:

Fully Private Auctions in a Constant Number of Rounds. 223-238 - Koutarou Suzuki, Makoto Yokoo:

Secure Generalized Vickrey Auction Using Homomorphic Encryption. 239-249 - Moti Yung:

Trusted Computing Platforms: The Good, the Bad, and the Ugly. 250-254 - Dirk Kuhlmann:

On TCPA. 255-269 - Yaron Sella:

On The Computation-Storage Trade-Offs of Hash Chain Traversal. 270-285 - Javier Herranz, Germán Sáez:

Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures. 286-302 - Aggelos Kiayias, Moti Yung:

Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making. 303-320

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














