Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
CRYPTO '88 Proceedings on Advances in cryptology
Controlled gradual disclosure schemes for random bits and their applications
CRYPTO '89 Proceedings on Advances in cryptology
ACM Transactions on Computer Systems (TOCS)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Security, fault tolerance, and communication complexity in distributed systems
Security, fault tolerance, and communication complexity in distributed systems
NetBill security and transaction protocol
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
iKP: a family of secure electronic payment protocols
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Ripping coins for a fair exchange
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Undeniable billing in mobile communication
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Efficient private bidding and auctions with an oblivious third party
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Unlinkable serial transactions: protocols and applications
ACM Transactions on Information and System Security (TISSEC)
Escrow services and incentives in peer-to-peer networks
Proceedings of the 3rd ACM conference on Electronic Commerce
Some guidelines for non-repudiation protocols
ACM SIGCOMM Computer Communication Review
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Finite-state analysis of two contract signing protocols
Theoretical Computer Science
An efficient protocol for anonymous and fair document exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce
VLDB '98 Proceedings of the 24rd International Conference on Very Large Data Bases
Abuse-Free Multi-party Contract Signing
Proceedings of the 13th International Symposium on Distributed Computing
Evolution of Fair Non-repudiation with TTP
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Models and Protocol Structures for Software Agent Based Complex E-Commerce Transactions
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
Fair Exchange of Digital Signatures with Offline Trusted Third Party
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Abuse-Free Optimistic Contract Signing
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Efficient Fair Exchange with Verifiable Confirmation of Signatures
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Off-Line Fair Payment Protocols Using Convertible Signatures
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Fair Exchange under Limited Trust
TES '02 Proceedings of the Third International Workshop on Technologies for E-Services
Analysis of Abuse-Free Contract Signing
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
An Efficient Protocol for Certified Electronic Mail
ISW '00 Proceedings of the Third International Workshop on Information Security
Efficient Optimistic N-Party Contract Signing Protocol
ISC '01 Proceedings of the 4th International Conference on Information Security
A Realistic Protocol for Multi-party Certified Electronic Mail
ISC '02 Proceedings of the 5th International Conference on Information Security
Exclusion-Freeness in Multi-party Exchange Protocols
ISC '02 Proceedings of the 5th International Conference on Information Security
A Secure Pay-per View Scheme for Web-Based Video Service
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Supporting fair exchange in mobile environments
Mobile Networks and Applications - Security in mobile computing environments
ACM SIGecom Exchanges
A unified approach to a fair document exchange system
Journal of Systems and Software
Identity-Based Fault-Tolerant Conference Key Agreement
IEEE Transactions on Dependable and Secure Computing
Autonomous mobile agent based fair exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
Certified E-Mail Delivery with DSA Receipts
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Revocation of privacy-enhanced public-key certificates
Journal of Systems and Software - Special issue: Software engineering education and training
ACM SIGOPS Operating Systems Review
A Family of Trusted Third Party Based Fair-Exchange Protocols
IEEE Transactions on Dependable and Secure Computing
Practical and efficient fair document exchange over networks
Journal of Network and Computer Applications
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
Orchestrating fair exchanges between mutually distrustful web services
Proceedings of the 3rd ACM workshop on Secure web services
An anonymous and failure resilient fair-exchange e-commerce protocol
Decision Support Systems
Providing Certified Mail Services on the Internet
IEEE Security and Privacy
A methodology for verification of digital items in fair exchange protocols with active trustee
Electronic Commerce Research
Privacy-preserving distributed association rule mining via semi-trusted mixer
Data & Knowledge Engineering
A secure protocol for misbehavior-penalization-based fair digital signature exchange
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Exclusions and related trust relationships in multi-party fair exchange protocols
Electronic Commerce Research and Applications
ACM SIGACT News
International Journal of Applied Cryptography
Dandelion: cooperative content distribution with robust incentives
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
Information and Software Technology
A Fair Mobile Payment Protocol
APNOMS '08 Proceedings of the 11th Asia-Pacific Symposium on Network Operations and Management: Challenges for Next Generation Network Operations and Service Management
Fair Threshold Decryption with Semi-Trusted Third Parties
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Autonomous mobile agent based fair exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
Analysis and improvement of fair certified e-mail delivery protocol
Computer Standards & Interfaces
P2P commercial digital content exchange
Electronic Commerce Research and Applications
An efficient ID-based verifiably encrypted signature scheme based on Hess's scheme
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
On fairness in exchange protocols
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Timeliness optimistic fair exchange protocol based on key-exposure-free chameleon hashing scheme
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Collaborative, privacy-preserving data aggregation at scale
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Fair exchange of valuable information: A generalised framework
Journal of Computer and System Sciences
Double verifiably encrypted signature-based contract signing protocol
ICICA'10 Proceedings of the First international conference on Information computing and applications
Fair threshold decryption with semi-trusted third parties
International Journal of Applied Cryptography
Contract signature in e-commerce
Computers and Electrical Engineering
A fair online payment system for digital content via subliminal channel
Electronic Commerce Research and Applications
A shared certified mail system for the austrian public and private sectors
EGOVIS'11 Proceedings of the Second international conference on Electronic government and the information systems perspective
Concurrent signatures with fully negotiable binding control
ProvSec'11 Proceedings of the 5th international conference on Provable security
A topological condition for solving fair exchange in byzantine environments
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Efficient fair certified e-mail delivery based on RSA
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
A fair multimedia exchange protocol
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
Efficient identity-based protocol for fair certified e-mail delivery
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
RSA extended modulus attacks and their solutions in a kind of fair exchange protocols
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Sovereign information sharing among malicious partners
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Cryptanalysis of the n-party encrypted diffie-hellman key exchange using different passwords
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
A private online system for executing wills based on a secret sharing mechanism
Security and Communication Networks
Risk balance in optimistic non-repudiation protocols
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
A Practical Approach of Fairness in E-Procurement
International Journal of Information Security and Privacy
Distributing trusted third parties
ACM SIGACT News
Secure peer-to-peer trading for multiplayer games
Proceedings of the 11th Annual Workshop on Network and Systems Support for Games
Hi-index | 0.00 |