Financial Cryptography '99, Conference writeup
February 22-25, 1999, Anguilla, BWI:
- Experimenting with electronic commerce on the PalmPilot.
N. Daswani and D. Boneh
- Blinding of credit card numbers in the SET protocol.
- Trustee tokens: Simple and practical anonymous digital coin tracing.
- A new approach for anonymity control in electronic cash systems.
T. Sander and A. Ta-Shma
- E-cash systems with randomized audit.
- Assessment of counterfeit transaction detection systems for smart card
K. Ezawa, G. Napiorkowski and M. Kossarski
- Reasoning about public-key certification: On bindings between entities
and public keys.
R. Kohlas and U. Maurer
- Online certificate status checking in financial transactions: The case
B. Fox and B. LaMacchia
- Playing `hide and seek' with stored keys.
A. Shamir and N. van Someren
- On channel capacity and modulation in watermarking of digital still
M. Breitbach and H. Imai
- Towards making broadcast encryption practical.
M. Abdalla, Y. Shavitt and A. Wool
- Conditional access concepts and principles.
D. Kravitz and D. Goldschlag
- Anonymous authentication of membership in dynamic groups.
S. Schecter, T. Parnell and A. Hartemink
- Some open issues and new directions in group signatures.
G. Ateniese and G. Tsudik
- Anonymous investing: Hiding the identities of stockholders.
P. MacKenzie and J. Sorensen
- Fair on-line auctions without special trusted parties.
S. Stubblebine and P. Syverson
- "Dynamic Fault"-robust cryptosystems meet organizational needs for
Y. Frankel and M. Yung
- Improved magic ink signatures using hints.
M. Jakobsson and J. Muller