Fair e-Lotteries and e-Casinos
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Playing Lottery on the Internet
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Rational Exchange - A Formal Model Based on Game Theory
WELCOM '01 Proceedings of the Second International Workshop on Electronic Commerce
Optimistic Fair Exchange with Transparent Signature Recovery
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Fair On-Line Auctions without Special Trusted Parties
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Supporting fair exchange in mobile environments
Mobile Networks and Applications - Security in mobile computing environments
A Formal Analysis of Syverson's Rational Exchange Protocol
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Hardening Functions for Large Scale Distributed Computations
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Defending Against Denial-of-Service Attacks with Puzzle Auctions
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A formal model of rational exchange and its application to the analysis of Syverson's protocol
Journal of Computer Security - Special issue on CSFW15
Provably Secure Timed-Release Public Key Encryption
ACM Transactions on Information and System Security (TISSEC)
Towards Automated Design of Multi-party Rational Exchange Security Protocols
WI-IATW '07 Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops
Nature---Inspired Synthesis of Rational Protocols
Proceedings of the 10th international conference on Parallel Problem Solving from Nature: PPSN X
Design and implementation of real-time betting system with offline terminals
Electronic Commerce Research and Applications
Reliable MIX cascade networks through reputation
FC'02 Proceedings of the 6th international conference on Financial cryptography
On fairness in exchange protocols
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Bayesian analysis of secure P2P sharing protocols
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Games for non-repudiation protocol correctness
International Journal of Wireless and Mobile Computing
Rational distance-bounding protocols over noisy channel
Proceedings of the 4th international conference on Security of information and networks
An extended model of rational exchange based on dynamic games of imperfect information
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
ISC'05 Proceedings of the 8th international conference on Information Security
The marriage proposals problem: fair and efficient solution for two-party computations
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
A secure distance-based RFID identification protocol with an off-line back-end database
Personal and Ubiquitous Computing
Timed-release and key-insulated public key encryption
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Timed release cryptography from bilinear pairings using hash chains
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
An intensive survey of fair non-repudiation protocols
Computer Communications
Improved anonymous timed-release encryption
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Secure peer-to-peer trading for multiplayer games
Proceedings of the 11th Annual Workshop on Network and Systems Support for Games
Hi-index | 0.00 |