Abstract is missing.
- On Cryptographic Techniques for On-line Bankcard Payment Transactions Using Open NetworksWenbo Mao. 1-17
- A Certification Scheme for Electronic CommerceBruno Crispo, T. Mark A. Lomas. 19-32
- Practical Escrow Cash SystemEiichiro Fujisaki, Tatsuaki Okamoto. 33-48
- NetCard - A Practical Electronic-Cash SystemRoss J. Anderson, Charalampos Manifavas, Chris Sutherland. 49-57
- Electronic Payments of Small AmountsTorben P. Pedersen. 59-68
- PayWord and MicroMint: Two Simple Micropayment SchemesRonald L. Rivest, Adi Shamir. 69-87
- Transactions Using BetsDavid Wheeler. 89-92
- Protocol Failures for RSA-Like Functions Using Lucas Sequences and Elliptic CurvesMarc Joye, Jean-Jacques Quisquater. 93-100
- Efficient and Provable Security AmplificationsRonald Cramer, Ivan Damgård, Torben P. Pedersen. 101-109
- A Comparison of RSA and the Naccache-Stern Public-Key CryptosystemThomas W. Cusick. 111-116
- IEEE P1363: A Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract)Burton S. Kaliski Jr.. 117-118
- Efficient and Secure Conference-Key DistributionMike Burmester, Yvo Desmedt. 119-129
- Directed Signatures and Application to Threshold CryptosystemsChae Hoon Lim, Pil Joong Lee. 131-138
- Key Escrow in Mutually Mistrusting DomainsLiqun Chen, Dieter Gollmann, Chris J. Mitchell. 139-153
- Automatic Event-Stream Notarization Using Digital SignaturesBruce Schneier, John Kelsey. 155-169
- Why Isn t Trust Transitive?Bruce Christianson, William S. Harbison. 171-176
- Securing the Residential Asynchronous Transfer Mode NetworksShaw-Cheng Chuang, David J. Greaves. 177-196
- Visual Cryptography II: Improving the Contrast Via the Cover BaseMoni Naor, Adi Shamir. 197-202