default search action
7th Financial Cryptography 2003: Guadeloupe, French West Indies
- Rebecca N. Wright:
Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers. Lecture Notes in Computer Science 2742, Springer 2003, ISBN 3-540-40663-8 - Simon N. Foley:
Using Trust Management to Support Transferable Hash-Based Micropayments. 1-14 - Markus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán:
A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. 15-33 - Matthieu Gaud, Jacques Traoré:
On the Anonymity of Fair Offline E-cash Systems. 34-50 - Shouhuai Xu, Moti Yung:
Retrofitting Fairness on the Original RSA-Based E-cash. 51-68 - Nicko van Someren, Andrew M. Odlyzko, Ronald L. Rivest, Tim Jones, Duncan Goldie-Scot:
Does Anyone Really Need MicroPayments? 69-76 - Andrew M. Odlyzko:
The Case Against Micropayments. 77-83 - Alessandro Acquisti, Roger Dingledine, Paul F. Syverson:
On the Economics of Anonymity. 84-102 - Ari Juels, Ravikanth Pappu:
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. 103-121 - Stuart E. Schechter, Michael D. Smith:
How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. 122-137 - Jacques Stern, Julien P. Stern:
Cryptanalysis of the OTM Signature Scheme from FC'02. 138-148 - Dennis Kügler:
"Man in the Middle" Attacks on Bluetooth. 149-161 - Johannes Blömer, Jean-Pierre Seifert:
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). 162-181 - Andrew M. Odlyzko:
Economics, Psychology, and Sociology of Security. 182-189 - Juan A. Garay, Carl Pomerance:
Timed Fair Exchange of Standard Signatures: [Extended Abstract]. 190-207 - Holger Vogt:
Asynchronous Optimistic Fair Exchange Based on Revocable Items. 208-222 - Felix Brandt:
Fully Private Auctions in a Constant Number of Rounds. 223-238 - Koutarou Suzuki, Makoto Yokoo:
Secure Generalized Vickrey Auction Using Homomorphic Encryption. 239-249 - Moti Yung:
Trusted Computing Platforms: The Good, the Bad, and the Ugly. 250-254 - Dirk Kuhlmann:
On TCPA. 255-269 - Yaron Sella:
On The Computation-Storage Trade-Offs of Hash Chain Traversal. 270-285 - Javier Herranz, Germán Sáez:
Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures. 286-302 - Aggelos Kiayias, Moti Yung:
Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making. 303-320
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.