Digital Rights Management |
Efficient Trace and Revoke Schemes / Moni Naor ; Benny Pinkas |
Efficient Watermark Detection and Collusion Security / Francis Zane |
Invited Lecture (I) |
Towards More Sensible Anti-circumvention Regulations / Pamela Samuelson |
Payment Systems |
Self-Escrowed Cash against User Blackmailing / Birgit Pfitzmann ; Ahmad-Reza Sadeghi |
Blind, Auditable Membership Proofs / Tomas Sander ; Amnon Ta-Shma ; Moti Yung |
Private Selective Payment Protocols / Giovanni Di Crescenzo |
Financial Cryptography Tools (I) |
Sharing Decryption in the Context of Voting or Lotteries / Pierre-Alain Fouque ; Guillaume Poupard ; Jacques Stern |
Electronic Postcards |
Postal Revenue Collection in the Digital Age / Leon A. Pintsov ; Scott A. Vanstone |
Signing on a Postcard / David Naccache |
Panel (I) |
Payment Systems: The Next Generation |
Abuses of Systems |
Non-repudiation in SET: Open Issues / Els Van Herreweghen |
Statistics and Secret Leakage / Jean-Sebastien Coron ; Paul Kocher |
Analysis of Abuse-Free Contract Signing / Vitaly Shmatikov ; John C. Mitchell |
Asymmetric Currency Rounding / David M'Ra¿ihi ; Michael Tunstall |
Financial Crypto Policies and Issues |
The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel / Barak D. Jolish |
Critical Comments on the European Directive on a Common Framework for Electronic Signatures and Certification Service Providers / Apol-lonia Martinez Nadal ; Josep Lluis Ferrer Gomila |
A Response to "Can We Eliminate Certificate Revocation Lists?" / Patrick McDaniel ; Aviel Rubin |
Anonymity |
Self-Scrambling Anonymizers / David Pointcheval |
Authentic Attributes with Fine-Grained Anonymity Protection / Stuart G. Stubblebine ; Paul F. Syverson |
Resource-Efficient Anonymous Group Identification / Ben Handley |
Financial Cryptography Tools (II) |
Secret Key Authentication with Software-Only Verification / Jaap-Henk Hoepman |
Panel (II) |
Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else? / Barbara Fox ; Brian LaMacchia |
System Architectures |
Financial Cryptography in 7 Layers / Ian Grigg |
Capability-Based Financial Instruments / Mark S. Miller ; Chip Morningstar ; Bill Frantz |
Author Index |
Digital Rights Management |
Efficient Trace and Revoke Schemes / Moni Naor ; Benny Pinkas |
Efficient Watermark Detection and Collusion Security / Francis Zane |
Invited Lecture (I) |
Towards More Sensible Anti-circumvention Regulations / Pamela Samuelson |
Payment Systems |