Financial cryptography

Results: 589



#Item
1This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic

This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-02-03 04:27:06
2Financial Cryptography and Data Security February 28 – March 4, 2011, Bay Gardens Beach Resort, St. Lucia http://ifca.ai/fc11/ Financial Cryptography and Data Security is a major international forum for research, advan

Financial Cryptography and Data Security February 28 – March 4, 2011, Bay Gardens Beach Resort, St. Lucia http://ifca.ai/fc11/ Financial Cryptography and Data Security is a major international forum for research, advan

Add to Reading List

Source URL: fc11.ifca.ai

Language: English - Date: 2010-09-28 04:53:23
    3Financial Cryptography and Data Security April 1 – 5, 2013, Busena Terrace Beach Resort, Okinawa, Japan http://fc13.ifca.ai/ Financial Cryptography and Data Security is a major international forum for research, advance

    Financial Cryptography and Data Security April 1 – 5, 2013, Busena Terrace Beach Resort, Okinawa, Japan http://fc13.ifca.ai/ Financial Cryptography and Data Security is a major international forum for research, advance

    Add to Reading List

    Source URL: fc13.ifca.ai

    Language: English - Date: 2012-12-24 18:49:52
      4

      Financial Cryptography 2010 Group To: Montserrat Wehbe Groups Coordinator. Viajes Best Travel S.L. Calle Bencomo, San Cristobal de La Laguna, Tenerife. SPAIN E-mail:

      Add to Reading List

      Source URL: fc10.ifca.ai

      Language: English - Date: 2009-12-18 13:12:21
        5Financial Cryptography and Data Security ’09 13th International Conference Accra Beach, Barbados February 23-26, 2009 http://fc09.ifca.ai Overview

        Financial Cryptography and Data Security ’09 13th International Conference Accra Beach, Barbados February 23-26, 2009 http://fc09.ifca.ai Overview

        Add to Reading List

        Source URL: fc09.ifca.ai

        Language: English - Date: 2008-12-12 12:15:50
          6This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic

          This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic

          Add to Reading List

          Source URL: fc17.ifca.ai

          - Date: 2017-03-17 11:53:43
            7Financial Cryptography and Data Security Tenerife, Canary Islands, SpainJanuary 2010 Overview Financial Cryptography and Data Security is a major international

            Financial Cryptography and Data Security Tenerife, Canary Islands, SpainJanuary 2010 Overview Financial Cryptography and Data Security is a major international

            Add to Reading List

            Source URL: fc10.ifca.ai

            - Date: 2009-11-18 05:04:28
              8THE WEST BENGAL NATIONAL UNIVERSITY OF JURIDICAL SCIENCES DR. AMBEDKAR BHAVAN, 12 LB BLOCK, SECTOR - III, SALT LAKE CITY KOLKATATEL.: http ://www.nujs.edu Application Form for Admiss

              THE WEST BENGAL NATIONAL UNIVERSITY OF JURIDICAL SCIENCES DR. AMBEDKAR BHAVAN, 12 LB BLOCK, SECTOR - III, SALT LAKE CITY KOLKATATEL.: http ://www.nujs.edu Application Form for Admiss

              Add to Reading List

              Source URL: nujs.edu

              Language: English - Date: 2016-04-06 00:46:01
              9lead security analyst reporting to – head of information security direct reports – IT security analyst working hours – full time is 35 hours a week. You’ll agree your working pattern with your manager.  the purpo

              lead security analyst reporting to – head of information security direct reports – IT security analyst working hours – full time is 35 hours a week. You’ll agree your working pattern with your manager. the purpo

              Add to Reading List

              Source URL: financial-ombudsman.org.uk

              Language: English - Date: 2016-02-24 11:29:57
              10Democracy Enhancing Technologies: Toward deployable and incoercible E2E elections by  Jeremy Clark

              Democracy Enhancing Technologies: Toward deployable and incoercible E2E elections by Jeremy Clark

              Add to Reading List

              Source URL: www.chaum.com

              Language: English - Date: 2015-05-26 20:06:41