A randomized protocol for signing contracts
Communications of the ACM
Proceedings of CRYPTO 84 on Advances in cryptology
Value exchange systems enabling security and unobservability
Computers and Security
NetCash: a design for practical electronic currency on the Internet
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Computer communications security: principles, standard protocols and techniques
Computer communications security: principles, standard protocols and techniques
Non-repudiation: constituting evidence and proof in digital cooperation
Computer Standards & Interfaces - Special issue: German National Research Center for computer science (GMD)
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
iKP: a family of secure electronic payment protocols
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Ripping coins for a fair exchange
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Optimal efficiency of optimistic contract signing
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
Undeniable billing in mobile communication
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Efficient private bidding and auctions with an oblivious third party
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Efficient verifiable encryption (and fair exchange) of digital signatures
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Proceedings of the 7th ACM conference on Computer and communications security
Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP
Proceedings of the 7th ACM conference on Computer and communications security
Verifying security protocols as planning in logic programming
ACM Transactions on Computational Logic (TOCL) - Special issue devoted to Robert A. Kowalski
Escrow services and incentives in peer-to-peer networks
Proceedings of the 3rd ACM conference on Electronic Commerce
Some guidelines for non-repudiation protocols
ACM SIGCOMM Computer Communication Review
An efficient protocol for anonymous and fair document exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
An Anomymous Fair Exchange E-commerce Protocol
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Abuse-Free Multi-party Contract Signing
Proceedings of the 13th International Symposium on Distributed Computing
Evolution of Fair Non-repudiation with TTP
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Models and Protocol Structures for Software Agent Based Complex E-Commerce Transactions
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
A Juridical Validation of a Contract Signing Protocol
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Round-Optimal and Abuse Free Optimistic Multi-party Contract Signing
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
Optimistic Asynchronous Multi-party Contract Signing with Reduced Number of Rounds
ICALP '01 Proceedings of the 28th International Colloquium on Automata, Languages and Programming,
A Multi-party Optimistic Non-repudiation Protocol
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Abuse-Free Optimistic Contract Signing
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Optimistic Fair Secure Computation
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Using Smart Cards for Fair Exchange
WELCOM '01 Proceedings of the Second International Workshop on Electronic Commerce
Selective Receipt in Certified E-mail
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Efficient Fair Exchange with Verifiable Confirmation of Signatures
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Fair Exchange under Limited Trust
TES '02 Proceedings of the Third International Workshop on Technologies for E-Services
Multilateral Security: Enabling Technologies and Their Evaluation
Informatics - 10 Years Back. 10 Years Ahead.
Signing Contracts and Paying Electronically
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Optimistic Fair Exchange with Transparent Signature Recovery
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
AMT '01 Proceedings of the 6th International Computer Science Conference on Active Media Technology
Discouraging Software Piracy Using Software Aging
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
An Efficient Protocol for Certified Electronic Mail
ISW '00 Proceedings of the Third International Workshop on Information Security
Efficient Optimistic N-Party Contract Signing Protocol
ISC '01 Proceedings of the 4th International Conference on Information Security
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party
ISC '01 Proceedings of the 4th International Conference on Information Security
A Realistic Protocol for Multi-party Certified Electronic Mail
ISC '02 Proceedings of the 5th International Conference on Information Security
An Anonymous Loan System Based on Group Signature Scheme
ISC '02 Proceedings of the 5th International Conference on Information Security
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
A Game-Based Verification of Non-repudiation and Fair Exchange Protocols
CONCUR '01 Proceedings of the 12th International Conference on Concurrency Theory
Supporting fair exchange in mobile environments
Mobile Networks and Applications - Security in mobile computing environments
(Im)possibility of safe exchange mechanism design
Eighteenth national conference on Artificial intelligence
Game Analysis of Abuse-free Contract Signing
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Approaching a Formal Definition of Fairness in Electronic Commerce
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
ACM SIGecom Exchanges
Simple and fast optimistic protocols for fair electronic exchange
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Cryptanalysis of the Wu--Varadhrajan fair exchange protocol
Information Processing Letters
A game-based verification of non-repudiation and fair exchange protocols
Journal of Computer Security - IFIP 2000
Verifiable encryption of digital signatures and applications
ACM Transactions on Information and System Security (TISSEC)
A unified approach to a fair document exchange system
Journal of Systems and Software
On timeliness of a fair non-repudiation protocol
InfoSecu '04 Proceedings of the 3rd international conference on Information security
A Family of Trusted Third Party Based Fair-Exchange Protocols
IEEE Transactions on Dependable and Secure Computing
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
An anonymous and failure resilient fair-exchange e-commerce protocol
Decision Support Systems
Generic non-repudiation protocols supporting transparent off-line TTP
Journal of Computer Security - On IWAP'05
Analysis of probabilistic contract signing
Journal of Computer Security
MobiDE '07 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access
Providing Certified Mail Services on the Internet
IEEE Security and Privacy
Fair multi-party contract signing using private contract signatures
Information and Computation
International Journal of High Performance Computing and Networking
Dandelion: cooperative content distribution with robust incentives
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components
Electronic Commerce Research and Applications
An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest
SAFECOMP '08 Proceedings of the 27th international conference on Computer Safety, Reliability, and Security
Multiparty nonrepudiation: A survey
ACM Computing Surveys (CSUR)
Ambiguous Optimistic Fair Exchange
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A new fair non-repudiation protocol for secure negotiation and contract signing
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
A generalised model of e-trading for gradual secret release fair exchange protocol
International Journal of Electronic Security and Digital Forensics
Security Analysis of Zhu-Bao's Verifiably Committed Signature
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Efficient Fair Exchange from Identity-Based Signature
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A Non-repudiated Self-service Store System Based on Portable Trusted Device
Wireless Personal Communications: An International Journal
Generic Fair Non-Repudiation Protocols with Transparent Off-line TTP
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Fair Threshold Decryption with Semi-Trusted Third Parties
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Proceedings of the 28th ACM symposium on Principles of distributed computing
Classification Framework for Fair Content Tracing Protocols
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
A practical security framework for a VANET-based entertainment service
Proceedings of the 4th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Some common attacks against certified email protocols and the countermeasures
Computer Communications
A new dependable exchange protocol
Computer Communications
Analysis and improvement of fair certified e-mail delivery protocol
Computer Standards & Interfaces
Modeling A Certified Email Protocol using I/O Automata
Electronic Notes in Theoretical Computer Science (ENTCS)
Signet: low-cost auditable transactions using SIMs and mobile phones
ACM SIGOPS Operating Systems Review
Robust and efficient incentives for cooperative content distribution
IEEE/ACM Transactions on Networking (TON)
Optimistic fair exchange in a multi-user setting
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Multi-party stand-alone and setup-free verifiably committed signatures
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
On fairness in exchange protocols
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Efficient oblivious augmented maps: location-based services with a payment broker
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Improved multi-party contract signing
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
PPAA: peer-to-peer anonymous authentication
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Legally-enforceable fairness in secure two-party computation
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Timeliness optimistic fair exchange protocol based on key-exposure-free chameleon hashing scheme
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Optimistic fair exchange with multiple arbiters
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Double verifiably encrypted signature-based contract signing protocol
ICICA'10 Proceedings of the First international conference on Information computing and applications
Fair threshold decryption with semi-trusted third parties
International Journal of Applied Cryptography
An agent-mediated fair exchange protocol
ICICS'10 Proceedings of the 12th international conference on Information and communications security
One-time trapdoor one-way functions
ISC'10 Proceedings of the 13th international conference on Information security
Group-oriented fair exchange of signatures
Information Sciences: an International Journal
Non-black-box computation of linear regression protocols with malicious adversaries
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Verification of A Key Chain Based TTP Transparent CEM Protocol
Electronic Notes in Theoretical Computer Science (ENTCS)
An optimistic fair protocol for p2p chained transaction
ASIAN'05 Proceedings of the 10th Asian Computing Science conference on Advances in computer science: data management on the web
The fairness of perfect concurrent signatures
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Multilateral security: enabling technologies and their evaluation
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Requirements for secure logging of decentralized cross-organizational workflow executions
OTM'05 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems
Deniable partial proxy signatures
ASIAN'04 Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Usable optimistic fair exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
Attacking an asynchronous multi-party contract signing protocol
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Design and implementation of an inline certified e-mail service
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Stand-Alone and setup-free verifiably committed signatures
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
On complete primitives for fairness
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
Game-based verification of multi-party contract signing protocols
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Fair offline payment using verifiable encryption
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Dependable transaction for electronic commerce
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
Gracefully degrading fair exchange with security modules
EDCC'05 Proceedings of the 5th European conference on Dependable Computing
On the security of a certified e-mail scheme
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Sovereign information sharing among malicious partners
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
On the quest for impartiality: design and analysis of a fair non-repudiation protocol
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Generic, optimistic, and efficient schemes for fair certified email delivery
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Unlinkable priced oblivious transfer with rechargeable wallets
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Further observations on optimistic fair exchange protocols in the multi-user setting
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
More on stand-alone and setup-free verifiably committed signatures
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
An improved e-commerce protocol for fair exchange
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Usable optimistic fair exchange
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
An intensive survey of fair non-repudiation protocols
Computer Communications
Game-based verification of contract signing protocols with minimal messages
Innovations in Systems and Software Engineering
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Perfect ambiguous optimistic fair exchange
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Information Sciences: an International Journal
Fair exchange of short signatures without trusted third party
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Design and formal verification of a CEM protocol with transparent TTP
Frontiers of Computer Science: Selected Publications from Chinese Universities
Fairness analysis of e-commerce protocols based on strand spaces
International Journal of Grid and Utility Computing
Fair private set intersection with a semi-trusted arbiter
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Hi-index | 0.00 |