Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
A course in number theory and cryptography
A course in number theory and cryptography
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Electronic Payment Systems
Global Electronic Commerce: Theory and Cases
Global Electronic Commerce: Theory and Cases
The ESPRIT Project CAFE - High Security Digital Payment Systems
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
NetCard - A Practical Electronic-Cash System
Proceedings of the International Workshop on Security Protocols
Overview of Elliptic Curve Cryptography
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Requirements for network payment: the NetCheque perspective
COMPCON '95 Proceedings of the 40th IEEE Computer Society International Conference
MMPS: A Versatile Mobile-to-Mobile Payment System
ICMB '05 Proceedings of the International Conference on Mobile Business
Hi-index | 0.00 |
Cryptographic communication protocols frequently employ random numbers to achieve desirable properties. Often, generators for pseudo-random numbers (PRNGs) are employed. A class of PRNGs that currently gains popularity are chaotic PRNGs which are derived ...