Abstract is missing.
- Anonymity Control in E-Cash SystemsGeorge I. Davida, Yair Frankel, Yiannis Tsiounis, Moti Yung. 1-16
- How to Make Personalized Web Browising Simple, Secure, and AnonymousEran Gabber, Phillip B. Gibbons, Yossi Matias, Alain J. Mayer. 17-32
- Anonymous Networking and Virtual Intranets: Tools for Anonymous CorporationsJim McCoy. 33-38
- Unlinkable Serial TransactionsPaul F. Syverson, Stuart G. Stubblebine, David M. Goldschlag. 39-56
- Efficient Electronic Cash with Restricted PrivacyCristian Radu, René Govaerts, Joos Vandewalle. 57-70
- The SPEED CipherYuliang Zheng. 71-90
- Evaluating the Security of Electronic MoneySimon L. Lelieveldt. 91-94
- Electronic Cash - Technology Will Denationalise MoneyDavid G. W. Birch, Neil A. McEvoy. 95-108
- Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in PerspectiveDavid Paul Maher. 109-122
- Some Critical Remarks on "Dynamic Data Authentication" as Specified in EMV 96Louis C. Guillou. 123-134
- Single-Chip Implementation of a Cryptosystem for Financial ApplicationsNikolaus Lange. 135-144
- Perspectives on Financial CryptographyRonald L. Rivest. 145-150
- Auditable Metering with Lightweight SecurityMatthew K. Franklin, Dahlia Malkhi. 151-160
- SVP: A Flexible Micropayment SchemeJacques Stern, Serge Vaudenay. 161-172
- An Efficient Micropayment System Based on Probabilistic PollingStanislaw Jarecki, Andrew M. Odlyzko. 173-192
- On the Continuum Between On-line and Off-line E-cash Systems - 1Yacov Yacobi. 193-202
- Towards Multiple-Payment Schemes for Digital MoneyHenning Pagnia, R. Jansen. 203-216
- Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money SystemMarkus Jakobsson, Moti Yung. 217-238
- The Uses and Limits of Financial Cryptography: A Law Professor s PerspectivePeter P. Swire. 239-258
- Legal Issues in CryptographyEdward J. Radlo. 259-286
- Digital Signatures TodayA. Michael Froomkin. 287-290
- An Attorney s Roadmap to the Digital Signature GuidelinesCharles R. Merrill. 291-298
- Alternative Visions for Legal Signatures and EvidenceBenjamin Wright. 299-300
- Money Laundering: Past, Present and FuturePeter C. Wayner. 301-306
- Electronic Lottery Tickets as MicropaymentsRonald L. Rivest. 307-314
- Strategic Tasks for Government in the Information AgePaul Lampru. 315-328
- Using Electronic Markets to Achieve Efficient Task DistributionIan Grigg, Christopher C. Petro. 329-339
- The Gateway Security Model in the Java Electronic Commerce FrameworkTheodore C. Goldstein. 340-354
- Highly Scalable On-line Payments Via Task DecouplingDavid W. Kravitz. 355-374
- GUMP: Grand Unified Meta-Protocols Recipes for Simple, Standards-Based Financial CryptographyBarbara Fox, Brian Beckman, Daniel R. Simon. 375-394
- Secure Netword Communications and Secure Store & Forward Mechanisms with the SAP R/3 SystemBernhard Esslinger, Jürgen Schneider. 395-407