Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Neil Daswani and Dan Boneh. Experimenting with Electronic Commerce on the PalmPilot. In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 1-16. Springer, 1999. [  paper | publisher ]
[2] Hugo Krawczyk. Blinding of Credit Card Numbers in the SET Protocol. In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 17-28. Springer, 1999. [  paper | publisher ]
[3] Ari Juels. Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing. In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 29-45. Springer, 1999. [  paper | publisher ]
[4] Tomas Sander and Amnon Ta-Shma. Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems. In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 46-61. Springer, 1999. [  paper | publisher ]
[5] Yacov Yacobi. Risk Management for E-Cash Systems with Partial Real-Time Audit. In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 62-71. Springer, 1999. [  paper | publisher ]
[6] Kazuo J. Ezawa and Gregory Napiorkowski and Mariusz Kossarski. Assessment of Effectiveness of Counterfeit Transaction Detection Systems for Smart Card Based Electronic Cash. In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 72-85. Springer, 1999. [  paper | publisher ]
[7] Reto Kohlas and Ueli M. Maurer. Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys. In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 86-103. Springer, 1999. [  paper | publisher ]
[8] Barbara Fox and Brian A. LaMacchia. Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance. In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 104-117. Springer, 1999. [  paper | publisher ]
[9] Adi Shamir and Nicko van Someren. Playing "Hide and Seek" with Stored Keys. In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 118-124. Springer, 1999. [  paper | publisher ]
[10] Markus Breitbach and Hideki Imai. On Channel Capacity and Modulation of Watermarks in Digital Still Images. In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 125-139. Springer, 1999. [  paper | publisher ]
[11] Michel Abdalla and Yuval Shavitt and Avishai Wool. Towards Making Broadcast Encryption Practical. In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 140-157. Springer, 1999. [  paper | publisher ]
[12] David W. Kravitz and David M. Goldschlag. Conditional Access Concepts and Principles. In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 158-172. Springer, 1999. [  paper | publisher ]
[13] Jon Callas and Joan Feigenbaum and David M. Goldschlag and Erin Sawyer. Fair Use, Intellectual Property, and the Information Economy (Panel Session Summary). In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 173-183. Springer, 1999. [  paper | publisher ]
[14] Stuart E. Schechter and Todd Parnell and Alexander J. Hartemink. Anonymous Authentication of Membership in Dynamic Groups. In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 184-195. Springer, 1999. [  paper | publisher ]
[15] Giuseppe Ateniese and Gene Tsudik. Some Open Issues and New Directions in Group Signatures. In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 196-211. Springer, 1999. [  paper | publisher ]
[16] Philip D. MacKenzie and Jeffrey S. Sorensen. Anonymous Investing: Hiding the Identities of Stockholders. In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 212-229. Springer, 1999. [  paper | publisher ]
[17] Stuart G. Stubblebine and Paul F. Syverson. Fair On-Line Auctions without Special Trusted Parties. In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 230-240. Springer, 1999. [  paper | publisher ]
[18] Yair Frankel and Moti Yung. Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control". In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 241-252. Springer, 1999. [  paper | publisher ]
[19] Markus Jakobsson and Joy M{\"u}ller. Improved Magic Ink Signatures Using Hints. In Matthew K. Franklin, editor, Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, pages 253-268. Springer, 1999. [  paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.