Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Fair exchange with a semi-trusted third party (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security
Designing for Web Site Usability
Computer
Sustaining Availability of Web Services under Distributed Denial of Service Attacks
IEEE Transactions on Computers
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
NetBill: An Internet commerce system optimized for network delivered services
COMPCON '95 Proceedings of the 40th IEEE Computer Society International Conference
ACM SIGecom Exchanges
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
NetBill security and transaction protocol
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Optimistic fair exchange of digital signatures
IEEE Journal on Selected Areas in Communications
Design, implementation, and deployment of the iKP secure electronic payment system
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Fair exchange constitutes a fundamental mechanism for electronic commerce. Fair exchange assumes that it is possible to verify the correctness of the digital items to be exchanged. However, when an item is indescribable , i.e., it cannot be formally specified, its verification becomes difficult, if not impossible. This hinders a practical deployment of fair exchange.We propose a methodology for the verification of indescribable digital items. The methodology allows a participant in a fair exchange protocol to personally verify the indescribable item without giving him any practical advantage over the other participant, and therefore without violating the fairness imposed by the protocol.