-
1
-
-
0031650188
-
Asynchronous protocols for optimistic fair exchange
-
Oakland, CA, May 3-6, IEEE Computer Society Press, Los Alamitos, CA
-
Asokan, N., Shoup, V. and Waidner, M. (1998) Asynchronous protocols for optimistic fair exchange. In Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 3-6, pp. 86-100. IEEE Computer Society Press, Los Alamitos, CA.
-
(1998)
Proc. IEEE Symp. on Security and Privacy
, pp. 86-100
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
2
-
-
84958060645
-
Secure group barter: Multi-party fair exchange with semi-trusted neutral parties
-
Goos, G., Hartmanis, J. and van Leeuwen, J. (eds), Anguilla, British West Indies, March, Springer-Verlag, Berlin, Germany
-
Franklin, M. and Tsudik, G. (1998) Secure group barter: Multi-party fair exchange with semi-trusted neutral parties. In Goos, G., Hartmanis, J. and van Leeuwen, J. (eds), Proc. Financial Cryptography (Lect. Notes Comput. Sci. 1465), Anguilla, British West Indies, March, pp. 90-102. Springer-Verlag, Berlin, Germany.
-
(1998)
Proc. Financial Cryptography Lect. Notes Comput. Sci.
, vol.1465
, pp. 90-102
-
-
Franklin, M.1
Tsudik, G.2
-
3
-
-
0004504925
-
-
IBM Research Report, RZ2892 (#90840), Zurich
-
Asokan, N., Schunter, M. and Waidner, M. (1996) Optimistic Protocols for Multi-Party Fair Exchange. IBM Research Report, RZ2892 (#90840), Zurich.
-
(1996)
Optimistic Protocols for Multi-Party Fair Exchange
-
-
Asokan, N.1
Schunter, M.2
Waidner, M.3
-
4
-
-
0030646696
-
Optimistic protocols for fair exchange
-
Zurich, Switzerland, April 4-7, ACM Press, New York
-
Asokan, N., Schunter, M. and Waidner, M. (1997) Optimistic protocols for fair exchange. In Proc. ACM Conf. on Computer and Communications Security, Zurich, Switzerland, April 4-7, pp. 6-17. ACM Press, New York.
-
(1997)
Proc. ACM Conf. on Computer and Communications Security
, pp. 6-17
-
-
Asokan, N.1
Schunter, M.2
Waidner, M.3
-
5
-
-
0031682832
-
Efficient and practical fair exchange protocols with off-line TTP
-
Oakland, CA, May 3-6, IEEE Computer Society Press, Los Alamitos, CA
-
Bao, F., Deng, R. and Mao, W. (1998) Efficient and practical fair exchange protocols with off-line TTP. In Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 3-6, pp. 77-85. IEEE Computer Society Press, Los Alamitos, CA.
-
(1998)
Proc. IEEE Symp. on Security and Privacy
, pp. 77-85
-
-
Bao, F.1
Deng, R.2
Mao, W.3
-
6
-
-
0025246897
-
A fair protocol for signing contracts
-
Ben-or, M., Goldreich, O., Micali, S. and Rivest, R. (1990) A fair protocol for signing contracts. IEEE Trans. Inf. Theory, 36, 40-46.
-
(1990)
IEEE Trans. Inf. Theory
, vol.36
, pp. 40-46
-
-
Ben-Or, M.1
Goldreich, O.2
Micali, S.3
Rivest, R.4
-
7
-
-
84976804419
-
How to exchange (secret) keys
-
Blum, M. (1983) How to exchange (secret) keys. ACM Trans. Comput. Syst., 1, 175-193.
-
(1983)
ACM Trans. Comput. Syst.
, vol.1
, pp. 175-193
-
-
Blum, M.1
-
8
-
-
85032862578
-
Controlled gradual disclosure schemes for random bits and their applications
-
Brassard, G. (ed.), Springer-Verlag, Berlin, Germany
-
Cleve, R. (1989) Controlled gradual disclosure schemes for random bits and their applications. In Brassard, G. (ed.), Proc. CRYPTO'89 (Lect. Notes Comput. Sci. 435), pp. 573-587. Springer-Verlag, Berlin, Germany.
-
(1989)
Proc. CRYPTO'89 Lect. Notes Comput. Sci.
, vol.435
, pp. 573-587
-
-
Cleve, R.1
-
9
-
-
0022080529
-
A randomised protocol for signing contracts
-
Even, S., Goldreich, O. and Lempel, A. (1985) A randomised protocol for signing contracts. Commun. ACM, 28, 637-647.
-
(1985)
Commun. ACM
, vol.28
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
10
-
-
0003628828
-
-
Prentice Hall, Englewood Cliffs, NJ
-
Ford, W. (1995) Computer Communications Security: Principles, Standard Protocols, and Techniques. Prentice Hall, Englewood Cliffs, NJ.
-
(1995)
Computer Communications Security: Principles, Standard Protocols, and Techniques
-
-
Ford, W.1
-
11
-
-
0030676227
-
Fair exchange with a semi-trusted third party
-
Zurich, Switzerland, April 4-7, ACM Press, New York
-
Franklin, M. and Reiter, M. (1997) Fair exchange with a semi-trusted third party. In Proc. ACM Conf. on Computer and Communications Security, Zurich, Switzerland, April 4-7, pp. 1-5. ACM Press, New York.
-
(1997)
Proc. ACM Conf. on Computer and Communications Security
, pp. 1-5
-
-
Franklin, M.1
Reiter, M.2
-
12
-
-
0012972102
-
A simple protocol for signing contracts
-
Plenum Press, New York
-
Goldreich, O. (1984) A simple protocol for signing contracts. Advances in Cryptology: Proc. Crypto'83, pp. 133-136. Plenum Press, New York.
-
(1984)
Advances in Cryptology: Proc. Crypto'83
, pp. 133-136
-
-
Goldreich, O.1
-
13
-
-
0004216472
-
-
Prentice Hall, Englewood Cliffs, NJ
-
Kaufman, C., Perlman, R. and Spencer, M. (1995) Network Security: Private Communication in a Public World. Prentice Hall, Englewood Cliffs, NJ.
-
(1995)
Network Security: Private Communication in a Public World
-
-
Kaufman, C.1
Perlman, R.2
Spencer, M.3
-
14
-
-
0012004574
-
How to simultaneously exchange secrets by general assumptions
-
April, Fairfax, VA
-
Okamoto, T. and Ohta, K. (1994) How to simultaneously exchange secrets by general assumptions. In Proc. ACM Conf. on Computer and Communication Security, April, Fairfax, VA, pp. 184-192.
-
(1994)
Proc. ACM Conf. on Computer and Communication Security
, pp. 184-192
-
-
Okamoto, T.1
Ohta, K.2
-
15
-
-
0020829007
-
Transaction protection by beacons
-
Rabin, M. O. (1983) Transaction protection by beacons. J. Comput. Syst. Sci., 27, 256-267.
-
(1983)
J. Comput. Syst. Sci.
, vol.27
, pp. 256-267
-
-
Rabin, M.O.1
-
16
-
-
0032178754
-
On the efficient implementation of fair non-repudiation
-
You, C. H., Zhou, J. and Lam, K. Y. (1998) On the efficient implementation of fair non-repudiation. ACM Comput. Commun. Rev., 28, 50-60.
-
(1998)
ACM Comput. Commun. Rev.
, vol.28
, pp. 50-60
-
-
You, C.H.1
Zhou, J.2
Lam, K.Y.3
-
17
-
-
0000281241
-
Achieving non-repudiation of receipt
-
Zhang, N. and Shi, Q. (1996) Achieving non-repudiation of receipt. Comput. J., 39, 844-853.
-
(1996)
Comput. J.
, vol.39
, pp. 844-853
-
-
Zhang, N.1
Shi, Q.2
-
18
-
-
0029724319
-
A fair non-repudiation protocol
-
Oakland, CA, May, IEEE Computer Society Press, Los Alamitos, CA
-
Zhou, J. and Gollmann, D. (1996) A fair non-repudiation protocol. In Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May, pp. 55-61. IEEE Computer Society Press, Los Alamitos, CA.
-
(1996)
Proc. IEEE Symp. on Security and Privacy
, pp. 55-61
-
-
Zhou, J.1
Gollmann, D.2
-
20
-
-
85027123825
-
New protocols for third-party-based authentication and secure broadcast
-
April, Fairfax, VA, ACM Press, New York
-
Gong, L. (1994) New protocols for third-party-based authentication and secure broadcast. In Proc. ACM Conference on Computer and Communication Security, April, Fairfax, VA, pp. 184-192. ACM Press, New York.
-
(1994)
Proc. ACM Conference on Computer and Communication Security
, pp. 184-192
-
-
Gong, L.1
-
21
-
-
0342832203
-
Network time protocol specification and implementation
-
Available via email at mailserv@ds.internic.net
-
Network Working Group Report (1989) Network Time Protocol Specification and Implementation. Internet Request for Comment (RFC) 1119. Available via email at mailserv@ds.internic.net
-
(1989)
Internet Request for Comment (RFC)
, vol.1119
-
-
-
22
-
-
0003355302
-
User datagram protocol
-
Available via email at mailserv@ds.internic.net
-
Postel, J. (1980) User Datagram Protocol. Internet Request for Comment (RFC) 768. Available via email at mailserv@ds.internic.net
-
(1980)
Internet Request for Comment (RFC)
, vol.768
-
-
Postel, J.1
-
23
-
-
0032623470
-
Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification
-
Gritzalis, S., Spinellis D. and Georgiadis, P. (1999) Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification. Comput. Commun., 22, 697-709.
-
(1999)
Comput. Commun.
, vol.22
, pp. 697-709
-
-
Gritzalis, S.1
Spinellis, D.2
Georgiadis, P.3
-
24
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
Kemmerer, R., Meadows, C. and Millen, J. (1994) Three systems for cryptographic protocol analysis. J. Cryptol., 7, 79-130.
-
(1994)
J. Cryptol.
, vol.7
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
|