| ISBN | 出版时间 | 包装 | 开本 | 页数 | 字数 |
|---|---|---|---|---|---|
| 未知 | 暂无 | 暂无 | 未知 | 0 | 暂无 |
Authentication and Fraud Detection
Phoolproof Phishing Prevention
A Protocol for Secure Public Instant Messaging
Using Automated Banking Certificates to Detect Unauthorised Financial Transactions
Privacy
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
A Private Stable Matching Algorithm
Private Policy Negotiation
Reputation and Mix-Nets
Uncheatable Reputation for Distributed Computation Markets
An Efficient Publicly Verifiable Mix-Net for Long Inputs
Auditable Privacy: On Tamper-Evident Mix Networks
Short Papers
A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation
Defeating Malicious Servers in a Blind Signatures Based Voting System
Pairing Based Threshold Cryptography hnproving on Libert-Quisquater and Baek-Zheng
Credit Transfer for Market-Based Infrastructure
A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions
Cryptanalysis of a Partially Blind Signature Scheme or How to Make
Conditional Financial Cryptography
A Generic Construction for Token-Controlled Public Key Encryption
Timed-Release and Key-Insulated Public Key Encryption
Conditional Encrypted Mapping and Comparing Encrypted Numbers
Revisiting Oblivious Signature-Based Envelopes
Payment Systems
Provably Secure Electronic Cash Based on Blind Multisignature Schemes
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings
……
Efficient Protocols
Author Index