A randomized protocol for signing contracts
Communications of the ACM
Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
NetCash: a design for practical electronic currency on the Internet
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Anonymous credit cards and their collusion analysis
IEEE/ACM Transactions on Networking (TON)
Fair exchange with a semi-trusted third party (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security
Optimistic protocols for fair exchange
Proceedings of the 4th ACM conference on Computer and communications security
ACM Transactions on Computer Systems (TOCS)
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
NetBill security and transaction protocol
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Advantages of a leveled commitment contracting protocol
AAAI'96 Proceedings of the thirteenth national conference on Artificial intelligence - Volume 1
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Proceedings of the twenty-second annual symposium on Principles of distributed computing
ExchangeGuard: A Distributed Protocol for Electronic Fair-Exchange
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
WWW '05 Proceedings of the 14th international conference on World Wide Web
Proceedings of the 11th annual international conference on Mobile computing and networking
Orchestrating fair exchanges between mutually distrustful web services
Proceedings of the 3rd ACM workshop on Secure web services
Securing decentralized reputation management using TrustGuard
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
A methodology for verification of digital items in fair exchange protocols with active trustee
Electronic Commerce Research
A Fair Mobile Payment Protocol
APNOMS '08 Proceedings of the 11th Asia-Pacific Symposium on Network Operations and Management: Challenges for Next Generation Network Operations and Service Management
Fair electronic exchange using biometrics
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Extended electronic signature policies
Proceedings of the 2nd international conference on Security of information and networks
Analysis and improvement of fair certified e-mail delivery protocol
Computer Standards & Interfaces
Standards and verification for fair-exchange and atomicity in e-commerce transactions
Information Sciences: an International Journal
An agent-mediated fair exchange protocol
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Securing P2P storage with a self-organizing payment scheme
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
E-commerce: protecting purchaser privacy to enforce trust
Electronic Commerce Research
A topological condition for solving fair exchange in byzantine environments
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
A fair multimedia exchange protocol
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
On secure orders in the presence of faults
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Verifiably encrypted signature scheme without random oracles
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
Hi-index | 0.00 |
Many business transactions over the Internet involve the exchange of digital products between two parties - electronic mails, digital audio and video, electronic contract signing and digital signatures, to name a few. Often these transactions occur between players that do not trust each other. To facilitate such transactions, a number of secure protocols have been proposed. The main objective of these protocols is: either both the parties obtain each other's items or none do. Sometimes it is not possible to meet the above objective and researchers have aimed for a weaker objective: gather evidence during protocol execution using which an honest party can prove his case. Protocols which meet any of the two objectives are collectively termed fair exchange protocols. In this paper we review some of the work done on such fair exchange protocols and identify areas that still need to be addressed.