default search action
8th Financial Cryptography 2004: Key West, FL, USA
- Ari Juels:
Financial Cryptography, 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers. Lecture Notes in Computer Science 3110, Springer 2004, ISBN 3-540-22420-3 - Jack R. Selby:
Analyzing the Success and Failure of Recent e-Payment Schemes (Abstract). 1 - Ronald L. Rivest:
Peppercoin Micropayments. 2-8 - Craig Gentry, Zulfikar Ramzan:
Microcredits for Verifiable Foreign Service Provider Metering. 9-23 - Matthias Enzmann, Marc Fischlin, Markus Schneider:
A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves. 24-38 - Stuart G. Stubblebine, Paul C. van Oorschot:
Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract). 39-53 - Lawrence O'Gorman, Amit Bagga, Jon Louis Bentley:
Call Center Customer Verification by Query-Directed Passwords. 54-67 - Jacques Stern:
Cryptography and the French Banking Cards: Past, Present, Future. 68-69 - Simon Pugh:
PayPass Security and Risk (Abstract). 70-71 - Aggelos Kiayias, Moti Yung:
The Vector-Ballot e-Voting Approach. 72-89 - Jens Groth:
Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast. 90-104 - Andrew S. Patrick:
Usability and Acceptability of Biometric Security Systems. 105 - L. Jean Camp:
Mental Models of Computer Security. 106-111 - William Yurcik:
Visualization Tools for Security Administrators. 112-113 - Ka-Ping Yee:
Secure Interaction Design. 114-115 - Jon M. Peha:
Bringing Payment Technology to the Unbanked (Abstract). 116 - Edith Elkind, Helger Lipmaa:
Interleaving Cryptography and Mechanism Design: The Case of Online Auctions. 117-131 - Makoto Yokoo, Koutarou Suzuki:
Secure Generalized Vickrey Auction without Third-party Servers. 132-146 - Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung:
Electronic National Lotteries. 147-163 - Giuseppe Ateniese, Breno de Medeiros:
Identity-Based Chameleon Hash and Applications. 164-180 - Vanessa Teague:
Selecting Correlated Random Actions. 181-195 - Giuseppe Persiano, Ivan Visconti:
An Efficient and Usable Multi-show Non-transferable Anonymous Credential System. 196-211 - Jaap-Henk Hoepman:
The Ephemeral Pairing Problem. 212-226 - Nick Mathewson, Roger Dingledine:
Mixminion: Strong Anonymity for Financial Cryptography. 227-232 - Marc Rennhard, Bernhard Plattner:
Practical Anonymity for the Masses with MorphMix. 233-250 - Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew K. Wright:
Timing Attacks in Low-Latency Mix Systems (Extended Abstract). 251-265 - Ron Berman, Amos Fiat, Amnon Ta-Shma:
Provable Unlinkability against Traffic Analysis. 266-280
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.