Verifiable secret sharing and multiparty protocols with honest majority
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
CRYPTO '88 Proceedings on Advances in cryptology
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Atomicity in electronic commerce
PODC '96 Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing
Fair exchange with a semi-trusted third party (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security
Trustee-based tracing extensions to anonymous cash and the making of anonymous change
Proceedings of the sixth annual ACM-SIAM symposium on Discrete algorithms
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Transaction Processing: Concepts and Techniques
Transaction Processing: Concepts and Techniques
Proceedings of the First International Conference on Financial Cryptography
FC '97 Proceedings of the First International Conference on Financial Cryptography
ASIAN '96 Proceedings of the Second Asian Computing Science Conference on Concurrency and Parallelism, Programming, Networking, and Security
Completely Asynchronous Optimistic Recovery with Minimal Rollbacks
FTCS '95 Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
Electronic auctions with private bids
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Model checking electronic commerce protocols
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Token and notational money in electronic commerce
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Economic mechanism design for computerized agents
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
NetBill security and transaction protocol
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
The millicent protocols for electronic commerce
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Secure coprocessors in electronic commerce applications
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Atomicity and isolation for transactional processes
ACM Transactions on Database Systems (TODS)
Modelling the ICE Standard with a Formal Language for Information Commerce
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
Transactions in Mobile Electronic Commerce
Selected papers from the Eight International Workshop on Foundations of Models and Languages for Data and Objects, Transactions and Database Dynamics
Execution Guarantees in Electronic Commerce Payments
Selected papers from the Eight International Workshop on Foundations of Models and Languages for Data and Objects, Transactions and Database Dynamics
User Action Recovery in Internet SAGAs (iSAGAs)
TES '01 Proceedings of the Second International Workshop on Technologies for E-Services
Ensuring Recovery for SACReD Web Transactions in the E-commerce Applications
DEXA '02 Proceedings of the 13th International Conference on Database and Expert Systems Applications
Pastiche: making backup cheap and easy
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Mobile User Recovery in the Context of Internet Transactions
IEEE Transactions on Mobile Computing
Recovery guarantees for Internet applications
ACM Transactions on Internet Technology (TOIT)
Supporting Dispute Handling in E-Commerce Transactions, a Framework and Related Methodologies
Electronic Commerce Research
Pastiche: making backup cheap and easy
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
The application of model checking for securing e-commerce transactions
Communications of the ACM - Hacking and innovation
Standards and verification for fair-exchange and atomicity in e-commerce transactions
Information Sciences: an International Journal
Protecting privacy during on-line trust negotiation
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Arbitration and matchmaking for agents with conflicting interests
CIA'99 Proceedings of the 3rd international conference on Cooperative information agents III
Research of atomic and anonymous electronic commerce protocol
RSFDGrC'03 Proceedings of the 9th international conference on Rough sets, fuzzy sets, data mining, and granular computing
Hi-index | 0.00 |