A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Time-Stamping with Binary Linking Schemes
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
The HP time vault service: exploiting IBE for timed release of confidential information
WWW '03 Proceedings of the 12th international conference on World Wide Web
Defining security services for electronic tendering
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Designing a secure e-tender submission protocol
Electronic Commerce Research
Hi-index | 0.00 |
Security requirements for e-tendering systems have not been closely scrutinised in the literature. This paper identifies key issues to be addressed in the design of secure e-tendering systems. In particular, the issues of secure timing and record keeping are raised. This paper also classifies existing e-tendering system designs by presenting common e-tendering architectures. A new e-tendering architecture, using distributed trusted third parties is proposed which may be suitable for secure large scale operations.