CRYPTO '89 Proceedings on Advances in cryptology
Disposable zero-knowledge authentications and their applications to untraceable electronic cash
CRYPTO '89 Proceedings on Advances in cryptology
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Improved privacy in wallets with observers
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A Formal Language for Cryptographic Protocol Requirements
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
The Design and Implementation of a Secure Auction Service
IEEE Transactions on Software Engineering
Information Security, Mathematics, and Public-Key Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
An Atomicity-Generating Protocol for Anonymous Currencies
IEEE Transactions on Software Engineering
Electronic Commerce: Review of Critical Research Issues
Information Systems Frontiers
A Protocol for Untraceable Electronic Cash
WAIM '00 Proceedings of the First International Conference on Web-Age Information Management
Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Efficient Electronic Cash Using Batch Signatures
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
An Equitably Fair On-line Auction Scheme
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
An E-check Framework for Electronic Payment Systems in the Web Based Environment
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
Privacy Protection for Transactions of Digital Goods
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
An Efficient and Provably Secure Threshold Blind Signature
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
SAC '98 Proceedings of the Selected Areas in Cryptography
Provably Secure Partially Blind Signatures
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
An Identity Escrow Scheme with Appointed Verifiers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A Cryptographic Scheme for Computerized Elections
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
How To Break and Repair A "Provably Secure" Untraceable Payment System
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Making Electronic Refunds Safer
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Wallet Databases with Observers
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Extensions of Single-term Coins
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Untraceable Off-line Cash in Wallets with Observers (Extended Abstract)
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Divisible Electronic Cash Scheme
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Anonymous Communication and Anonymous Cash
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
LAVA: Secure Delegation of Mobile Applets: Design, Implementation, and Applications
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
Priced Oblivious Transfer: How to Sell Digital Goods
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
An Architecture for Secure Generation and Verification of Electronic Coupons
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
An Online, Transferable E-Cash Payment System
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Fair Off-Line e-cash Made Easy
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Attacking and Repairing Batch Verification Schemes
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Signing Contracts and Paying Electronically
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Security Aspects of the Ecash Payment System
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Anonymous Investing: Hiding the Identities of Stockholders
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Risk Management for E-Cash Systems with Partial Real-Time Audit
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Anonymous Authentication of Membership in Dynamic Groups
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing
FC '99 Proceedings of the Third International Conference on Financial Cryptography
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Analysis of Abuse-Free Contract Signing
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Self-Escrowed Cash against User Blackmailing
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
ISW '99 Proceedings of the Second International Workshop on Information Security
Money Conservation via Atomicity in Fair Off-Line E-Cash
ISW '99 Proceedings of the Second International Workshop on Information Security
Efficient Transferable Cash with Group Signatures
ISC '01 Proceedings of the 4th International Conference on Information Security
Message Recovery Fair Blind Signature
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
On Privacy Issues of Internet Access Services via Proxy Servers
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Electronic Payments: Where Do We Go from Here?
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Improved Magic Ink Signatures Using Hints
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Fair electronic cash based on double signatures
Journal of Computer Science and Technology
A flexible payment scheme and its permission-role assignment
ACSC '03 Proceedings of the 26th Australasian computer science conference - Volume 16
Secure web transaction with anonymous mobile agent over internet
Journal of Computer Science and Technology
Towards Pseudonymous e-Commerce
Electronic Commerce Research
Anonymous Membership Broadcast Schemes
Designs, Codes and Cryptography
SeAl: Managing Accesses and Data in Peer-to-Peer Sharing Networks
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
How to conduct a sealed bargain on the internet
InfoSecu '04 Proceedings of the 3rd international conference on Information security
A Flexible Payment Scheme and Its Role-Based Access Control
IEEE Transactions on Knowledge and Data Engineering
Protocols that hide user's preferences in electronic transactions
Computer Networks: The International Journal of Computer and Telecommunications Networking
Providing witness anonymity in peer-to-peer systems
Proceedings of the 13th ACM conference on Computer and communications security
Model checking for design and assurance of e-business processes
Decision Support Systems
Implementing regular cash with blind fixed-value electronic coins
Computer Standards & Interfaces
Digital coins: fairness implemented by observer
Journal of Theoretical and Applied Electronic Commerce Research
Model checking electronic commerce protocols
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Building blocks for atomicity in electronic commerce
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
A framework for building an electronic currency system
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment
Wireless Personal Communications: An International Journal
An Efficient Blind Signature Scheme for Information Hiding
International Journal of Electronic Commerce
Information Sciences: an International Journal
Flexible resource allocation and composition across gsm/3g networks and wlans
Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control
Information Security and Cryptology
Token-Based Payment in Dynamic SAML-Based Federations
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
PAR: Payment for Anonymous Routing
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Privacy Preserving Data Mining within Anonymous Credential Systems
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Buyer-seller watermarking protocols with off-line trusted third parties
International Journal of Ad Hoc and Ubiquitous Computing
Anonymous Fair Transaction Protocols Based on Electronic Cash
International Journal of Electronic Commerce
Conditional Payments for Computing Markets
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
An incentive-based electronic payment scheme for digital content transactions over the Internet
Journal of Network and Computer Applications
Provably Secure Untraceable Electronic Cash against Insider Attacks
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Blind signature and ring signature schemes: Rehabilitation and attack
Computer Standards & Interfaces
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
An improved and efficient micro-payment scheme
Journal of Theoretical and Applied Electronic Commerce Research
Wifi-reports: improving wireless network selection with collaboration
Proceedings of the 7th international conference on Mobile systems, applications, and services
Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment
Formal to Practical Security
A Generic Protocol for Controlling Access to Mobile Services
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Fair E-Cash: Be Compact, Spend Faster
ISC '09 Proceedings of the 12th International Conference on Information Security
Compact E-Cash and Simulatable VRFs Revisited
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
An on-line electronic check system with mutual authentication
Computers and Electrical Engineering
Protocols that hide user's preferences in electronic transactions
Computer Networks: The International Journal of Computer and Telecommunications Networking
A novel and efficient unlinkable secret handshakes scheme
IEEE Communications Letters
XPay: practical anonymous payments for tor routing and other networked services
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Integration of a secure mobile payment system in a GSM/UMTS SIM smart card
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
A practical anonymous off-line multi-authority payment scheme
Electronic Commerce Research and Applications
Ownership-attached unblinding of blind signatures for untraceable electronic cash
Information Sciences: an International Journal
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Distributed "magic ink" signatures
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Transferred cash grows in size
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Ripping coins for a fair exchange
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Restrictive binding of secret-key certificates
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
A fully anonymous electronic payment scheme for B2B
ICWE'03 Proceedings of the 2003 international conference on Web engineering
Refundable electronic cash for mobile commerce
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
An anonymous buyer-seller watermarking protocol with anonymity control
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
A provably secure blind signature scheme
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Research of atomic and anonymous electronic commerce protocol
RSFDGrC'03 Proceedings of the 9th international conference on Rough sets, fuzzy sets, data mining, and granular computing
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
P-signatures and noninteractive anonymous credentials
TCC'08 Proceedings of the 5th conference on Theory of cryptography
Provably secure randomized blind signature scheme based on bilinear pairing
Computers & Mathematics with Applications
Providing witness anonymity under peer-to-peer settings
IEEE Transactions on Information Forensics and Security
Recruiting new tor relays with BRAIDS
Proceedings of the 17th ACM conference on Computer and communications security
Post-quantum cryptography: code-based signatures
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Conditional e-payments with transferability
Journal of Parallel and Distributed Computing
Secure electronic bills of lading: blind counts and digital signatures
Electronic Commerce Research
Privacy and liveliness for reputation systems
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Electronic cash with anonymous user suspension
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Non-interactive distributed encryption: a new primitive for revocable privacy
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
A novel electronic cash system with trustee-based anonymity revocation from pairing
Electronic Commerce Research and Applications
Using “fair forfeit” to prevent truncation attacks on mobile agents
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Two improved partially blind signature schemes from bilinear pairings
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Counting abuses using flexible off-line credentials
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
A universally composable scheme for electronic cash
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
A cryptographic framework for the controlled release of certified data
SP'04 Proceedings of the 12th international conference on Security Protocols
The dancing bear: a new way of composing ciphers
SP'04 Proceedings of the 12th international conference on Security Protocols
Charging in peer-to-peer systems based on a token accounting system
ICQT'06 Proceedings of the 5th international conference on Internet Charging and QoS Technologies: performability has its Price
Anonymous payment in a fair e-commerce protocol with verifiable TTP
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Vulnerability of a mobile payment system proposed at WISA 2002
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Recoverable and untraceable e-cash
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Short linkable ring signatures for e-voting, e-cash and attestation
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users
Wireless Personal Communications: An International Journal
e-learning of security and information assurance with sequence diagrams
Proceedings of the 2012 Joint International Conference on Human-Centered Computer Environments
Provably secure electronic cash based on blind multisignature schemes
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Efficient provably secure restrictive partially blind signatures from bilinear pairings
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Balancing accountability and privacy using e-cash (extended abstract)
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Unclonable group identification
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Two-Head dragon protocol: preventing cloning of signature keys
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
An agent infrastructure for privacy-enhancing agent-based e-commerce applications
AAMAS'11 Proceedings of the 10th international conference on Advanced Agent Technology
Beyond the limitation of prime-order bilinear groups, and round optimal blind signatures
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
An efficient multi-receipt mechanism for uncoercible anonymous electronic voting
Mathematical and Computer Modelling: An International Journal
MNPA: a mobile network privacy architecture
Computer Communications
Research note: Date attachable electronic cash
Computer Communications
Research note: On the security of fair blind signature scheme using oblivious transfer
Computer Communications
Randomization enhanced Chaum's blind signature scheme
Computer Communications
A robust e-commerce service: Light-weight secure mail-order mechanism
Electronic Commerce Research and Applications
Double-spending fast payments in bitcoin
Proceedings of the 2012 ACM conference on Computer and communications security
Authorization architectures for privacy-respecting surveillance
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Computer Networks: The International Journal of Computer and Telecommunications Networking
Privacy management in global organisations
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
On the centrality of off-line e-cash to concrete partial information games
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Resuscitating privacy-preserving mobile payment with customer in complete control
Personal and Ubiquitous Computing
Divisible e-cash in the standard model
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Hang with your buddies to resist intersection attacks
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Secure pay while on move toll collection using VANET
Computer Standards & Interfaces
Hi-index | 0.01 |