The Design and Implementation of a Secure Auction Service
IEEE Transactions on Software Engineering
Strand spaces: proving security protocols correct
Journal of Computer Security
Journal of Systems and Software
Authentication tests and the structure of bundles
Theoretical Computer Science
A Practical English Auction with One-Time Registration
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Security Protocol Design via Authentication Tests
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Hi-index | 0.00 |
Electronic Commerce (EC) has made rapid progress in recent years. Internet auctions have become especially popular in EC. Recently, Jiang-Pan-Li (JPL) proposed an improvement on Chang et al.'s efficient anonymous auction protocols in order to overcome the security weakness in the initiation phase of Chang et al.'s protocol. The current paper, however, points out that JPL's initiation protocol is inefficiently designed and then, two optimized initiation protocols are presented to resolve such problems.