Abstract is missing.
- Efficient Trace and Revoke SchemesMoni Naor, Benny Pinkas. 1-20 [doi]
- Efficient Watermark Detection and Collusion SecurityFrancis Zane. 21-32 [doi]
- Towards More Sensible Anti-circumvention RegulationsPamela Samuelson. 33-41 [doi]
- Self-Escrowed Cash against User BlackmailingBirgit Pfitzmann, Ahmad-Reza Sadeghi. 42-52 [doi]
- Blind, Auditable Membership ProofsTomas Sander, Amnon Ta-Shma, Moti Yung. 53-71 [doi]
- Private Selective Payment ProtocolsGiovanni Di Crescenzo. 72-89 [doi]
- Sharing Decryption in the Context of Voting or LotteriesPierre-Alain Fouque, Guillaume Poupard, Jacques Stern. 90-104 [doi]
- Postal Revenue Collection in the Digital AgeLeon A. Pintsov, Scott A. Vanstone. 105-120 [doi]
- Signing on a PostcardDavid Naccache, Jacques Stern. 121-135 [doi]
- Payment Systems: The Next GenerationMoti Yung. 136-139 [doi]
- Non-repudiation in SET: Open IssuesEls Van Herreweghen. 140-156 [doi]
- Statistics and Secret LeakageJean-Sébastien Coron, Paul C. Kocher, David Naccache. 157-173 [doi]
- Analysis of Abuse-Free Contract SigningVitaly Shmatikov, John C. Mitchell. 174-191 [doi]
- Asymmetric Currency RoundingDavid M Raïhi, David Naccache, Michael Tunstall. 192-201 [doi]
- The Encryption Debate in Plaintext: National Security and Encryption in the United States and IsraelBarak D. Jolish. 202-224 [doi]
- Critical Comments on the European Directive on a Common Framework for Electronic Signatures and Certification Service ProvidersApollònia Martínez Nadal, Josep Lluís Ferrer-Gomila. 225-244 [doi]
- A Response to Can We Eliminate Certificate Revocation Lists? Patrick Drew McDaniel, Aviel D. Rubin. 245-258 [doi]
- Self-Scrambling AnonymizersDavid Pointcheval. 259-275 [doi]
- Authentic Attributes with Fine-Grained Anonymity ProtectionStuart G. Stubblebine, Paul F. Syverson. 276-294 [doi]
- Resource-Efficient Anonymous Group IdentificationBen Handley. 295-312 [doi]
- Secret Key Authentication with Software-Only VerificationJaap-Henk Hoepman. 313-326 [doi]
- Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else?Barbara Fox, Brian A. LaMacchia. 327-331 [doi]
- Financial Cryptography in 7 LayersIan Grigg. 332-348 [doi]
- Capability-Based Financial InstrumentsMark Samuel Miller, Chip Morningstar, Bill Frantz. 349-378 [doi]