Abstract is missing.
- Using Trust Management to Support Transferable Hash-Based MicropaymentsSimon N. Foley. 1-14 [doi]
- A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular NetworksMarkus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán. 15-33 [doi]
- On the Anonymity of Fair Offline E-cash SystemsMatthieu Gaud, Jacques Traoré. 34-50 [doi]
- Retrofitting Fairness on the Original RSA-Based E-cashShouhuai Xu, Moti Yung. 51-68 [doi]
- Does Anyone Really Need MicroPayments?Nicko van Someren, Andrew M. Odlyzko, Ronald L. Rivest, Tim Jones, Duncan Goldie-Scot. 69-76 [doi]
- The Case Against MicropaymentsAndrew M. Odlyzko. 77-83 [doi]
- On the Economics of AnonymityAlessandro Acquisti, Roger Dingledine, Paul F. Syverson. 84-102 [doi]
- Squealing Euros: Privacy Protection in RFID-Enabled BanknotesAri Juels, Ravikanth Pappu. 103-121 [doi]
- How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and NetworksStuart E. Schechter, Michael D. Smith. 122-137 [doi]
- Cryptanalysis of the OTM Signature Scheme from FC 02Jacques Stern, Julien P. Stern. 138-148 [doi]
- Man in the Middle Attacks on BluetoothDennis Kügler. 149-161 [doi]
- Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)Johannes Blömer, Jean-Pierre Seifert. 162-181 [doi]
- Economics, Psychology, and Sociology of SecurityAndrew M. Odlyzko. 182-189 [doi]
- Timed Fair Exchange of Standard Signatures: [Extended Abstract]Juan A. Garay, Carl Pomerance. 190-207 [doi]
- Asynchronous Optimistic Fair Exchange Based on Revocable ItemsHolger Vogt. 208-222 [doi]
- Fully Private Auctions in a Constant Number of RoundsFelix Brandt. 223-238 [doi]
- Secure Generalized Vickrey Auction Using Homomorphic EncryptionKoutarou Suzuki, Makoto Yokoo. 239-249 [doi]
- Trusted Computing Platforms: The Good, the Bad, and the UglyMoti Yung. 250-254 [doi]
- On TCPADirk Kuhlmann. 255-269 [doi]
- On The Computation-Storage Trade-Offs of Hash Chain TraversalYaron Sella. 270-285 [doi]
- Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy SignaturesJavier Herranz, Germán Sáez. 286-302 [doi]
- Non-interactive Zero-Sharing with Applications to Private Distributed Decision MakingAggelos Kiayias, Moti Yung. 303-320 [doi]