


default search action
8th Financial Cryptography 2004: Key West, FL, USA
- Ari Juels:

Financial Cryptography, 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers. Lecture Notes in Computer Science 3110, Springer 2004, ISBN 3-540-22420-3 - Jack R. Selby:

Analyzing the Success and Failure of Recent e-Payment Schemes (Abstract). 1 - Ronald L. Rivest:

Peppercoin Micropayments. 2-8 - Craig Gentry, Zulfikar Ramzan:

Microcredits for Verifiable Foreign Service Provider Metering. 9-23 - Matthias Enzmann, Marc Fischlin, Markus Schneider:

A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves. 24-38 - Stuart G. Stubblebine, Paul C. van Oorschot:

Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract). 39-53 - Lawrence O'Gorman, Amit Bagga, Jon Louis Bentley:

Call Center Customer Verification by Query-Directed Passwords. 54-67 - Jacques Stern:

Cryptography and the French Banking Cards: Past, Present, Future. 68-69 - Simon Pugh:

PayPass Security and Risk (Abstract). 70-71 - Aggelos Kiayias, Moti Yung:

The Vector-Ballot e-Voting Approach. 72-89 - Jens Groth:

Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast. 90-104 - Andrew S. Patrick:

Usability and Acceptability of Biometric Security Systems. 105 - L. Jean Camp:

Mental Models of Computer Security. 106-111 - William Yurcik:

Visualization Tools for Security Administrators. 112-113 - Ka-Ping Yee:

Secure Interaction Design. 114-115 - Jon M. Peha:

Bringing Payment Technology to the Unbanked (Abstract). 116 - Edith Elkind, Helger Lipmaa:

Interleaving Cryptography and Mechanism Design: The Case of Online Auctions. 117-131 - Makoto Yokoo, Koutarou Suzuki:

Secure Generalized Vickrey Auction without Third-party Servers. 132-146 - Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou

, Moti Yung:
Electronic National Lotteries. 147-163 - Giuseppe Ateniese, Breno de Medeiros:

Identity-Based Chameleon Hash and Applications. 164-180 - Vanessa Teague:

Selecting Correlated Random Actions. 181-195 - Giuseppe Persiano, Ivan Visconti:

An Efficient and Usable Multi-show Non-transferable Anonymous Credential System. 196-211 - Jaap-Henk Hoepman:

The Ephemeral Pairing Problem. 212-226 - Nick Mathewson, Roger Dingledine:

Mixminion: Strong Anonymity for Financial Cryptography. 227-232 - Marc Rennhard, Bernhard Plattner:

Practical Anonymity for the Masses with MorphMix. 233-250 - Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew K. Wright:

Timing Attacks in Low-Latency Mix Systems (Extended Abstract). 251-265 - Ron Berman

, Amos Fiat, Amnon Ta-Shma
:
Provable Unlinkability against Traffic Analysis. 266-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














