


default search action
9th Financial Cryptography 2005: Roseau, The Commonwealth of Dominica
- Andrew S. Patrick, Moti Yung:

Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers. Lecture Notes in Computer Science 3570, Springer 2005, ISBN 3-540-26656-9
Threat and Attacks
- Gildas Avoine:

Fraud Within Asymmetric Multi-hop Cellular Networks. 1-15 - David Dagon, Wenke Lee, Richard J. Lipton:

Protecting Secret Data from Insider Attacks. 16-30 - Paul C. van Oorschot, Stuart G. Stubblebine:

Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling. 31-43
Invited Speaker
- Bezalel Gavish:

Trust and Swindling on the Internet. 44
Digital Signing Methods
- Fangguo Zhang

, Willy Susilo
, Yi Mu:
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). 45-56 - Yevgeniy Dodis, Dae Hyun Yum:

Time Capsule Signature. 57-71 - Walid Bagga, Refik Molva:

Policy-Based Cryptography and Applications. 72-87
Panel
- Richard Clayton, Drew Dean, Markus Jakobsson, Steven A. Myers, Stuart G. Stubblebine, Michael Szydlo:

A Chat at the Old Phishin' Hole. 88 - Markus Jakobsson:

Modeling and Preventing Phishing Attacks. 89 - Steven A. Myers:

Helping the Phish Detect the Lure. 90 - Richard Clayton:

Who'd Phish from the Summit of Kilimanjaro?. 91-92
Privacy
- Liqun Chen

, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider, Michael Steiner:
A Privacy-Protecting Coupon System. 93-108 - Aggelos Kiayias, Antonina Mitrofanova:

Testing Disjointness of Private Datasets. 109-124
Hardware Oriented Mechanisms
- Gildas Avoine, Philippe Oechslin:

RFID Traceability: A Multilayer Problem. 125-140 - Pim Tuyls, Boris Skoric, S. Stallinga, Anton H. M. Akkermans, W. Ophey:

Information-Theoretic Security Analysis of Physical Uncloneable Functions. 141-155
Supporting Financial Transactions
- Michael Szydlo:

Risk Assurance for Hedge Funds Using Zero Knowledge Proofs. 156-171 - Stanislaw Jarecki, Vitaly Shmatikov:

Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure. 172-187
Systems, Applications, and Experiences
- Simson L. Garfinkel

, Jeffrey I. Schiller, Erik Nordlander, David Margrave, Robert C. Miller:
Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce. 188-202 - Andrew Koyfman:

Securing Sensitive Data with the Ingrian DataSecure Platform. 203-210 - Lars Eilebrecht

:
Ciphire Mail Email Encryption and Authentication. 211-224
Message Authentication
- Jeff King, André L. M. dos Santos:

A User-Friendly Approach to Human Authentication of Messages. 225-239 - Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, Gonzalo R. Arce:

Approximate Message Authentication and Biometric Entity Authentication. 240-254
Exchanges and Contracts
- Aybek Mukhamedov, Steve Kremer

, Eike Ritter:
Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model. 255-269 - Keith B. Frikken, Mikhail J. Atallah:

Achieving Fairness in Private Contract Negotiation. 270-284
Auctions and Voting
- Edith Elkind, Helger Lipmaa:

Small Coalitions Cannot Manipulate Voting. 285-297 - Felix Brandt, Tuomas Sandholm:

Efficient Privacy-Preserving Protocols for Multi-unit Auctions. 298-312 - Eu-Jin Goh, Philippe Golle:

Event Driven Private Counters. 313-327
Works in Progress
- Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine:

Secure Distributed Human Computation. 328-332 - Koutarou Suzuki, Makoto Yokoo:

Secure Multi-attribute Procurement Auction. 333-335 - Fernando Godínez, Dieter Hutter

, Raúl Monroy:
Audit File Reduction Using N-Gram Models. 336-340
User Authentication
- Michel Abdalla

, David Pointcheval
:
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. 341-356 - Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia:

Secure Biometric Authentication for Weak Computational Devices. 357-371 - Allan Friedman:

Panel Summary: Incentives, Markets and Information Security. 372-373

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














