Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Moni Naor and Benny Pinkas. Efficient Trace and Revoke Schemes. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 1-20. Springer, 2000. [  paper | publisher ]
[2] Francis Zane. Efficient Watermark Detection and Collusion Security. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 21-32. Springer, 2000. [  paper | publisher ]
[3] Pamela Samuelson. Towards More Sensible Anti-circumvention Regulations. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 33-41. Springer, 2000. [  paper | publisher ]
[4] Birgit Pfitzmann and Ahmad-Reza Sadeghi. Self-Escrowed Cash against User Blackmailing. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 42-52. Springer, 2000. [  paper | publisher ]
[5] Tomas Sander and Amnon Ta-Shma and Moti Yung. Blind, Auditable Membership Proofs. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 53-71. Springer, 2000. [  paper | publisher ]
[6] Giovanni Di Crescenzo. Private Selective Payment Protocols. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 72-89. Springer, 2000. [  paper | publisher ]
[7] Pierre-Alain Fouque and Guillaume Poupard and Jacques Stern. Sharing Decryption in the Context of Voting or Lotteries. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 90-104. Springer, 2000. [  paper | publisher ]
[8] Leon A. Pintsov and Scott A. Vanstone. Postal Revenue Collection in the Digital Age. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 105-120. Springer, 2000. [  paper | publisher ]
[9] David Naccache and Jacques Stern. Signing on a Postcard. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 121-135. Springer, 2000. [  paper | publisher ]
[10] Moti Yung. Payment Systems: The Next Generation. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 136-139. Springer, 2000. [  paper | publisher ]
[11] Els Van Herreweghen. Non-repudiation in SET: Open Issues. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 140-156. Springer, 2000. [  paper | publisher ]
[12] Jean-S{\'e}bastien Coron and Paul C. Kocher and David Naccache. Statistics and Secret Leakage. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 157-173. Springer, 2000. [  paper | publisher ]
[13] Vitaly Shmatikov and John C. Mitchell. Analysis of Abuse-Free Contract Signing. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 174-191. Springer, 2000. [  paper | publisher ]
[14] David M'Ra\"{\i}hi and David Naccache and Michael Tunstall. Asymmetric Currency Rounding. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 192-201. Springer, 2000. [  paper | publisher ]
[15] Barak D. Jolish. The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 202-224. Springer, 2000. [  paper | publisher ]
[16] Apoll{\`o}nia Mart\'{\i}nez Nadal and Josep Llu\'{\i}s Ferrer-Gomila. Critical Comments on the European Directive on a Common Framework for Electronic Signatures and Certification Service Providers. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 225-244. Springer, 2000. [  paper | publisher ]
[17] Patrick Drew McDaniel and Aviel D. Rubin. A Response to ''Can We Eliminate Certificate Revocation Lists?''. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 245-258. Springer, 2000. [  paper | publisher ]
[18] David Pointcheval. Self-Scrambling Anonymizers. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 259-275. Springer, 2000. [  paper | publisher ]
[19] Stuart G. Stubblebine and Paul F. Syverson. Authentic Attributes with Fine-Grained Anonymity Protection. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 276-294. Springer, 2000. [  paper | publisher ]
[20] Ben Handley. Resource-Efficient Anonymous Group Identification. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 295-312. Springer, 2000. [  paper | publisher ]
[21] Jaap-Henk Hoepman. Secret Key Authentication with Software-Only Verification. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 313-326. Springer, 2000. [  paper | publisher ]
[22] Barbara Fox and Brian A. LaMacchia. Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else?. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 327-331. Springer, 2000. [  paper | publisher ]
[23] Ian Grigg. Financial Cryptography in 7 Layers. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 332-348. Springer, 2000. [  paper | publisher ]
[24] Mark S. Miller and Chip Morningstar and Bill Frantz. Capability-Based Financial Instruments. In Yair Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 349-378. Springer, 2000. [  paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.