Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Atomicity in electronic commerce
PODC '96 Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Issues '95—electronic commerce
ACM SIGSAC Review - Soecial issues on Issues 95: electronic commerce
Atomicity in electronic commerce
PODC '96 Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing
Fair exchange with a semi-trusted third party (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security
Atomicity in electronic commerce
netWorker
Designing a generic payment service
IBM Systems Journal
On the efficient implementation of fair non-repudiation
ACM SIGCOMM Computer Communication Review
Distributed digital-ticket management for rights trading system
Proceedings of the 1st ACM conference on Electronic commerce
Escrow services and incentives in peer-to-peer networks
Proceedings of the 3rd ACM conference on Electronic Commerce
Some guidelines for non-repudiation protocols
ACM SIGCOMM Computer Communication Review
Finite-state analysis of two contract signing protocols
Theoretical Computer Science
A Study of Communication Delays for Web Transactions
Cluster Computing
Digital Libraries for the Next Millennium: Challenges and Research Directions
Information Systems Frontiers
An Anomymous Fair Exchange E-commerce Protocol
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce
VLDB '98 Proceedings of the 24rd International Conference on Very Large Data Bases
Abuse-Free Multi-party Contract Signing
Proceedings of the 13th International Symposium on Distributed Computing
Establishing Business Rules for Inter-Enterprise Electronic Commerce
DISC '00 Proceedings of the 14th International Conference on Distributed Computing
MicroBill: An Efficient Secure System for Subscription Based Services
ASIAN '02 Proceedings of the7th Asian Computing Science Conference on Advances in Computing Science: Internet Computing and Modeling, Grid Computing, Peer-to-Peer Computing, and Cluster
Evolution of Fair Non-repudiation with TTP
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Models and Protocol Structures for Software Agent Based Complex E-Commerce Transactions
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
A Juridical Validation of a Contract Signing Protocol
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Execution Guarantees in Electronic Commerce Payments
Selected papers from the Eight International Workshop on Foundations of Models and Languages for Data and Objects, Transactions and Database Dynamics
Abuse-Free Optimistic Contract Signing
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Efficient Fair Exchange with Verifiable Confirmation of Signatures
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Offline Micropayments without Trusted Hardware
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Analysis of Abuse-Free Contract Signing
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
An Efficient Protocol for Certified Electronic Mail
ISW '00 Proceedings of the Third International Workshop on Information Security
SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery
ISC '01 Proceedings of the 4th International Conference on Information Security
Extended Modeling Languages for Interaction Protocol Design
AOSE '01 Revised Papers and Invited Contributions from the Second International Workshop on Agent-Oriented Software Engineering II
Electronic Payments: Where Do We Go from Here?
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
A flexible payment scheme and its permission-role assignment
ACSC '03 Proceedings of the 26th Australasian computer science conference - Volume 16
E-Commerce Payment Protocols: Requirements and Analysis
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Distributed Authentication in Kerberos Using Public Key Cryptography
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
An Interface Specification Language For Automatically Analyzing Cryptographic Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
ACM SIGecom Exchanges
P2P M-commerce in pervasive environments
ACM SIGecom Exchanges - Mobile commerce
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Payment technologies for E-commerce
Supporting Dispute Handling in E-Commerce Transactions, a Framework and Related Methodologies
Electronic Commerce Research
A Flexible Payment Scheme and Its Role-Based Access Control
IEEE Transactions on Knowledge and Data Engineering
Using certified policies to regulate E-commerce transactions
ACM Transactions on Internet Technology (TOIT)
Non-interference proof technique for the analysis of cryptographic protocols
Journal of Computer Security - Special issue on WITS'03
WebSOS: an overlay-based system for protecting web servers from denial of service attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
The application of model checking for securing e-commerce transactions
Communications of the ACM - Hacking and innovation
An anonymous and failure resilient fair-exchange e-commerce protocol
Decision Support Systems
Model checking for design and assurance of e-business processes
Decision Support Systems
A Mobile Ticket System Based on Personal Trusted Device
Wireless Personal Communications: An International Journal
Digital-ticket-controlled digital ticket circulation
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
A methodology for verification of digital items in fair exchange protocols with active trustee
Electronic Commerce Research
NetCents: a lightweight protocol for secure micropayments
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
SWAPEROO: a simple wallet architecture for payments, exchanges, refunds, and other operations
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Towards a framework for handling disputes in payment systems
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Verifying cryptographic protocols for electronic commerce
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Model checking electronic commerce protocols
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Agora: a minimal distributed protocol for electronic commerce
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
WWW electronic commerce and java trojan horses
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Building blocks for atomicity in electronic commerce
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components
Electronic Commerce Research and Applications
Information and Software Technology
A reasoning agent for credit card fraud using the event calculus
International Journal of Electronic Security and Digital Forensics
A Non-repudiated Self-service Store System Based on Portable Trusted Device
Wireless Personal Communications: An International Journal
Fair electronic exchange using biometrics
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Fair Threshold Decryption with Semi-Trusted Third Parties
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Flash payment: payment using flash disks
Proceedings of the 11th International Conference on Electronic Commerce
Secure Transaction Protocol for CEPS Compliant EPS in Limited Connectivity Environment
EC-Web 2009 Proceedings of the 10th International Conference on E-Commerce and Web Technologies
WebSOS: an overlay-based system for protecting web servers from denial of service attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Standards and verification for fair-exchange and atomicity in e-commerce transactions
Information Sciences: an International Journal
Formal analysis of the iKP electronic payment protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Requirement analysis for interaction protocols
CEEMAS'03 Proceedings of the 3rd Central and Eastern European conference on Multi-agent systems
Research of atomic and anonymous electronic commerce protocol
RSFDGrC'03 Proceedings of the 9th international conference on Rough sets, fuzzy sets, data mining, and granular computing
Applying inductive logic programming to process mining
ILP'07 Proceedings of the 17th international conference on Inductive logic programming
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
ZKPDL: a language-based system for efficient zero-knowledge proofs and electronic cash
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Fair threshold decryption with semi-trusted third parties
International Journal of Applied Cryptography
Multi-agent-based Pay-Per-Use (PpU) distributed manufacturing
International Journal of Computer Applications in Technology
An agent-mediated fair exchange protocol
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Commitment-based protocols with behavioral rules and correctness properties of MAS
DALT'10 Proceedings of the 8th international conference on Declarative agent languages and technologies VIII
An authentication protocol for pervasive computing
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
A fair multimedia exchange protocol
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
Model-Based analysis of money accountability in electronic purses
WINE'05 Proceedings of the First international conference on Internet and Network Economics
MobiCoin: digital cash for m-commerce
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
e-learning of security and information assurance with sequence diagrams
Proceedings of the 2012 Joint International Conference on Human-Centered Computer Environments
On secure orders in the presence of faults
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Security protocols verification in abductive logic programming: a case study
ESAW'05 Proceedings of the 6th international conference on Engineering Societies in the Agents World
Agreeing on defeasible commitments
DALT'06 Proceedings of the 4th international conference on Declarative Agent Languages and Technologies
Securing digital signatures for non-repudiation
Computer Communications
Designing Security Properties-Centric Communication Protocols using a Component-Based Approach
International Journal of Distributed Systems and Technologies
Hi-index | 0.00 |
NetBill is a system for micropayments for information goods on the Internet. This paper presents the NetBill protocol and describes its security and transactional features. Among our key innovations are: • An atomic certified delivery method so that a customer pays if and only if she receives her information goods intact. • Outsourcing access control: different users can use different access control servers. • A credential mechanism allowing users to prove membership in groups. This supports discounts. • A structure for constructing pseudonyms to protect the identities of consumers.