A public key cryptosystem and a signature scheme based on discrete logarithms
Proceedings of CRYPTO 84 on Advances in cryptology
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
CRYPTO '88 Proceedings on Advances in cryptology
Efficient identification and signatures for smart cards
CRYPTO '89 Proceedings on Advances in cryptology
Disposable zero-knowledge authentications and their applications to untraceable electronic cash
CRYPTO '89 Proceedings on Advances in cryptology
On blind signatures and perfect crimes
Computers and Security
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
NetCash: a design for practical electronic currency on the Internet
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Extensions of single-term coins
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Untraceable off-line cash in wallet with observers
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Endorsements, licensing, and insurance for distributed system services
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Trustee-based tracing extensions to anonymous cash and the making of anonymous change
Proceedings of the sixth annual ACM-SIAM symposium on Discrete algorithms
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
How To Break and Repair A "Provably Secure" Untraceable Payment System
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Wallet Databases with Observers
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Divisible Electronic Cash Scheme
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
CommerceNet: spontaneous electronic commerce on the Internet
COMPCON '95 Proceedings of the 40th IEEE Computer Society International Conference
Payment switches for open networks
COMPCON '95 Proceedings of the 40th IEEE Computer Society International Conference
Requirements for network payment: the NetCheque perspective
COMPCON '95 Proceedings of the 40th IEEE Computer Society International Conference
NetBill: An Internet commerce system optimized for network delivered services
COMPCON '95 Proceedings of the 40th IEEE Computer Society International Conference
An Efficient Off-line Electronic Cash System Based On The Representation Problem.
An Efficient Off-line Electronic Cash System Based On The Representation Problem.
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Ripping coins for a fair exchange
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Fair electronic cash withdrawal and change return for wireless networks
WMC '01 Proceedings of the 1st international workshop on Mobile commerce
Efficient Electronic Cash Using Batch Signatures
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
SAC '98 Proceedings of the Selected Areas in Cryptography
Auditable, Anonymous Electronic Cash Extended Abstract
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Fair Off-Line e-cash Made Easy
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Anonymous Investing: Hiding the Identities of Stockholders
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Blind, Auditable Membership Proofs
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Self-Escrowed Cash against User Blackmailing
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Money Conservation via Atomicity in Fair Off-Line E-Cash
ISW '99 Proceedings of the Second International Workshop on Information Security
Mini-Cash: A Minimalistic Approach to E-Commerce
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Marking: A Privacy Protecting Approach Against Blackmailing
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Electronic Payments: Where Do We Go from Here?
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Linkability in Practical Electronic Cash Design
ISW '00 Proceedings of the Third International Workshop on Information Security
A Practical Approach Defeating Blackmailing
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Improved Magic Ink Signatures Using Hints
FC '99 Proceedings of the Third International Conference on Financial Cryptography
On Anonymous Electronic Cash and Crime
ISW '99 Proceedings of the Second International Workshop on Information Security
Fair electronic cash based on double signatures
Journal of Computer Science and Technology
VarietyCash: a multi-purpose electronic payment system
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Remote Electronic Voting with Revocable Anonymity
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Publicly verifiable secret sharing
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Distributed "magic ink" signatures
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Offline payments with auditable tracing
FC'02 Proceedings of the 6th international conference on Financial cryptography
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Provably secure integrated on/off-line electronic cash for flexible and efficient payment
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Privacy-preserving, taxable bank accounts
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Cryptovirology: extortion-based security threats and countermeasures
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
True trustworthy elections: remote electronic voting using trusted computing
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Anonymous authentication with optional shared anonymity revocation and linkability
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Auditable envelopes: tracking anonymity revocation using trusted computing
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Hi-index | 0.00 |