Abstract is missing.
- Analyzing the Success and Failure of Recent e-Payment Schemes (Abstract)Jack R. Selby. 1 [doi]
- Peppercoin MicropaymentsRonald L. Rivest. 2-8 [doi]
- Microcredits for Verifiable Foreign Service Provider MeteringCraig Gentry, Zulfikar Ramzan. 9-23 [doi]
- A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic CurvesMatthias Enzmann, Marc Fischlin, Markus Schneider 0002. 24-38 [doi]
- Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract)Stuart G. Stubblebine, Paul C. van Oorschot. 39-53 [doi]
- Call Center Customer Verification by Query-Directed PasswordsLawrence O Gorman, Amit Bagga, Jon Louis Bentley. 54-67 [doi]
- Cryptography and the French Banking Cards: Past, Present, FutureJacques Stern. 68-69 [doi]
- PayPass Security and Risk (Abstract)Simon Pugh. 70-71 [doi]
- The Vector-Ballot e-Voting ApproachAggelos Kiayias, Moti Yung. 72-89 [doi]
- Efficient Maximal Privacy in Boardroom Voting and Anonymous BroadcastJens Groth. 90-104 [doi]
- Usability and Acceptability of Biometric Security SystemsAndrew S. Patrick. 105 [doi]
- Mental Models of Computer SecurityL. Jean Camp. 106-111 [doi]
- Visualization Tools for Security AdministratorsWilliam Yurcik. 112-113 [doi]
- Secure Interaction DesignKa-Ping Yee. 114-115 [doi]
- Bringing Payment Technology to the Unbanked (Abstract)Jon M. Peha. 116 [doi]
- Interleaving Cryptography and Mechanism Design: The Case of Online AuctionsEdith Elkind, Helger Lipmaa. 117-131 [doi]
- Secure Generalized Vickrey Auction without Third-party ServersMakoto Yokoo, Koutarou Suzuki. 132-146 [doi]
- Electronic National LotteriesElisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung. 147-163 [doi]
- Identity-Based Chameleon Hash and ApplicationsGiuseppe Ateniese, Breno de Medeiros. 164-180 [doi]
- Selecting Correlated Random ActionsVanessa Teague. 181-195 [doi]
- An Efficient and Usable Multi-show Non-transferable Anonymous Credential SystemGiuseppe Persiano, Ivan Visconti. 196-211 [doi]
- The Ephemeral Pairing ProblemJaap-Henk Hoepman. 212-226 [doi]
- Mixminion: Strong Anonymity for Financial CryptographyNick Mathewson, Roger Dingledine. 227-232 [doi]
- Practical Anonymity for the Masses with MorphMixMarc Rennhard, Bernhard Plattner. 233-250 [doi]
- Timing Attacks in Low-Latency Mix Systems (Extended Abstract)Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew Wright. 251-265 [doi]
- Provable Unlinkability against Traffic AnalysisRon Berman, Amos Fiat, Amnon Ta-Shma. 266-280 [doi]