default search action
10th Financial Cryptography 2006: Anguilla, British West Indies
- Giovanni Di Crescenzo, Aviel D. Rubin:
Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4107, Springer 2006, ISBN 3-540-46255-4
Authentication and Fraud Detection
- Bryan Parno, Cynthia Kuo, Adrian Perrig:
Phoolproof Phishing Prevention. 1-19 - Mohammad Mannan, Paul C. van Oorschot:
A Protocol for Secure Public Instant Messaging. 20-35 - C. Corzo, F. Corzo S., Ning Zhang, Andy Carpenter:
Using Automated Banking Certificates to Detect Unauthorised Financial Transactions. 36-51
Privacy
- Adam Barth, Dan Boneh, Brent Waters:
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. 52-64 - Philippe Golle:
A Private Stable Matching Algorithm. 65-80 - Klaus Kursawe, Gregory Neven, Pim Tuyls:
Private Policy Negotiation. 81-95
Reputation and Mix-Nets
- Bogdan Carbunar, Radu Sion:
Uncheatable Reputation for Distributed Computation Markets. 96-110 - Jun Furukawa, Kazue Sako:
An Efficient Publicly Verifiable Mix-Net for Long Inputs. 111-125 - Jong Youl Choi, Philippe Golle, Markus Jakobsson:
Auditable Privacy: On Tamper-Evident Mix Networks. 126-141
Short Papers
- Peter Bogetoft, Ivan Damgård, Thomas P. Jakobsen, Kurt Nielsen
, Jakob Pagter, Tomas Toft:
A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. 142-147 - Sébastien Canard, Matthieu Gaud, Jacques Traoré:
Defeating Malicious Servers in a Blind Signatures Based Voting System. 148-153 - Yvo Desmedt, Tanja Lange:
Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng. 154-159 - Tyler Close:
Credit Transfer for Market-Based Infrastructure. 160-165 - Michael Szydlo:
A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions. 166-170 - Gwenaëlle Martinet, Guillaume Poupard, Philippe Sola:
Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones. 171-176
Conditional Financial Cryptography
- David Galindo, Javier Herranz:
A Generic Construction for Token-Controlled Public Key Encryption. 177-190 - Jung Hee Cheon, Nicholas Hopper, Yongdae Kim
, Ivan Osipkov:
Timed-Release and Key-Insulated Public Key Encryption. 191-205 - Ian F. Blake, Vladimir Kolesnikov:
Conditional Encrypted Mapping and Comparing Encrypted Numbers. 206-220 - Samad Nasserian, Gene Tsudik:
Revisiting Oblivious Signature-Based Envelopes. 221-235
Payment Systems
- Yoshikazu Hanatani, Yuichi Komano, Kazuo Ohta, Noboru Kunihiro:
Provably Secure Electronic Cash Based on Blind Multisignature Schemes. 236-250 - Xiaofeng Chen, Fangguo Zhang
, Yi Mu, Willy Susilo
:
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. 251-265 - Lan Nguyen:
Privacy-Protecting Coupon System Revisited. 266-280
Efficient Protocols
- Yong Ho Hwang, Pil Joong Lee:
Efficient Broadcast Encryption Scheme with Log-Key Storage. 281-295 - Mikhail J. Atallah, Marina Blanton
, Keith B. Frikken, Jiangtao Li:
Efficient Correlated Action Selection. 296-310 - Aggelos Kiayias, Moti Yung:
Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination. 311-325
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.