Membership authentication for hierarchical multigroups using the extended Fiat-Shamir scheme
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A new on-line cash check scheme
Proceedings of the 4th ACM conference on Computer and communications security
Trustee-based tracing extensions to anonymous cash and the making of anonymous change
Proceedings of the sixth annual ACM-SIAM symposium on Discrete algorithms
MicroBill: An Efficient Secure System for Subscription Based Services
ASIAN '02 Proceedings of the7th Asian Computing Science Conference on Advances in Computing Science: Internet Computing and Modeling, Grid Computing, Peer-to-Peer Computing, and Cluster
An Internet Anonymous Auction Scheme
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
How To Break and Repair A "Provably Secure" Untraceable Payment System
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Spending Offline Divisible Coins with Combining Capability
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Security Aspects of the Ecash Payment System
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Payment technologies for E-commerce
Safe Tcl: a toolbox for constructing electronic meeting places
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Distributed architectures for electronic cash schemes: a survey
International Journal of Parallel, Emergent and Distributed Systems
Counting abuses using flexible off-line credentials
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Efficient and secure stored-value cards with leakage resilience
Computers and Electrical Engineering
Hi-index | 0.00 |