메뉴 건너뛰기




Volumn 42, Issue 7, 1999, Pages 569-581

Flexible approach to secure and fair document exchange

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC COMMERCE; ELECTRONIC DATA INTERCHANGE; FUNCTIONS; NETWORK PROTOCOLS; POLYNOMIALS; SECURITY OF DATA;

EID: 0033279914     PISSN: 00104620     EISSN: None     Source Type: Journal    
DOI: 10.1093/comjnl/42.7.569     Document Type: Article
Times cited : (5)

References (24)
  • 1
    • 0031650188 scopus 로고    scopus 로고
    • Asynchronous protocols for optimistic fair exchange
    • Oakland, CA, May 3-6, IEEE Computer Society Press, Los Alamitos, CA
    • Asokan, N., Shoup, V. and Waidner, M. (1998) Asynchronous protocols for optimistic fair exchange. In Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 3-6, pp. 86-100. IEEE Computer Society Press, Los Alamitos, CA.
    • (1998) Proc. IEEE Symp. on Security and Privacy , pp. 86-100
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 2
    • 84958060645 scopus 로고    scopus 로고
    • Secure group barter: Multi-party fair exchange with semi-trusted neutral parties
    • Goos, G., Hartmanis, J. and van Leeuwen, J. (eds), Anguilla, British West Indies, March, Springer-Verlag, Berlin, Germany
    • Franklin, M. and Tsudik, G. (1998) Secure group barter: Multi-party fair exchange with semi-trusted neutral parties. In Goos, G., Hartmanis, J. and van Leeuwen, J. (eds), Proc. Financial Cryptography (Lect. Notes Comput. Sci. 1465), Anguilla, British West Indies, March, pp. 90-102. Springer-Verlag, Berlin, Germany.
    • (1998) Proc. Financial Cryptography Lect. Notes Comput. Sci. , vol.1465 , pp. 90-102
    • Franklin, M.1    Tsudik, G.2
  • 5
    • 0031682832 scopus 로고    scopus 로고
    • Efficient and practical fair exchange protocols with off-line TTP
    • Oakland, CA, May 3-6, IEEE Computer Society Press, Los Alamitos, CA
    • Bao, F., Deng, R. and Mao, W. (1998) Efficient and practical fair exchange protocols with off-line TTP. In Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 3-6, pp. 77-85. IEEE Computer Society Press, Los Alamitos, CA.
    • (1998) Proc. IEEE Symp. on Security and Privacy , pp. 77-85
    • Bao, F.1    Deng, R.2    Mao, W.3
  • 7
    • 84976804419 scopus 로고
    • How to exchange (secret) keys
    • Blum, M. (1983) How to exchange (secret) keys. ACM Trans. Comput. Syst., 1, 175-193.
    • (1983) ACM Trans. Comput. Syst. , vol.1 , pp. 175-193
    • Blum, M.1
  • 8
    • 85032862578 scopus 로고
    • Controlled gradual disclosure schemes for random bits and their applications
    • Brassard, G. (ed.), Springer-Verlag, Berlin, Germany
    • Cleve, R. (1989) Controlled gradual disclosure schemes for random bits and their applications. In Brassard, G. (ed.), Proc. CRYPTO'89 (Lect. Notes Comput. Sci. 435), pp. 573-587. Springer-Verlag, Berlin, Germany.
    • (1989) Proc. CRYPTO'89 Lect. Notes Comput. Sci. , vol.435 , pp. 573-587
    • Cleve, R.1
  • 9
    • 0022080529 scopus 로고
    • A randomised protocol for signing contracts
    • Even, S., Goldreich, O. and Lempel, A. (1985) A randomised protocol for signing contracts. Commun. ACM, 28, 637-647.
    • (1985) Commun. ACM , vol.28 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 11
    • 0030676227 scopus 로고    scopus 로고
    • Fair exchange with a semi-trusted third party
    • Zurich, Switzerland, April 4-7, ACM Press, New York
    • Franklin, M. and Reiter, M. (1997) Fair exchange with a semi-trusted third party. In Proc. ACM Conf. on Computer and Communications Security, Zurich, Switzerland, April 4-7, pp. 1-5. ACM Press, New York.
    • (1997) Proc. ACM Conf. on Computer and Communications Security , pp. 1-5
    • Franklin, M.1    Reiter, M.2
  • 12
    • 0012972102 scopus 로고
    • A simple protocol for signing contracts
    • Plenum Press, New York
    • Goldreich, O. (1984) A simple protocol for signing contracts. Advances in Cryptology: Proc. Crypto'83, pp. 133-136. Plenum Press, New York.
    • (1984) Advances in Cryptology: Proc. Crypto'83 , pp. 133-136
    • Goldreich, O.1
  • 14
    • 0012004574 scopus 로고
    • How to simultaneously exchange secrets by general assumptions
    • April, Fairfax, VA
    • Okamoto, T. and Ohta, K. (1994) How to simultaneously exchange secrets by general assumptions. In Proc. ACM Conf. on Computer and Communication Security, April, Fairfax, VA, pp. 184-192.
    • (1994) Proc. ACM Conf. on Computer and Communication Security , pp. 184-192
    • Okamoto, T.1    Ohta, K.2
  • 15
    • 0020829007 scopus 로고
    • Transaction protection by beacons
    • Rabin, M. O. (1983) Transaction protection by beacons. J. Comput. Syst. Sci., 27, 256-267.
    • (1983) J. Comput. Syst. Sci. , vol.27 , pp. 256-267
    • Rabin, M.O.1
  • 16
    • 0032178754 scopus 로고    scopus 로고
    • On the efficient implementation of fair non-repudiation
    • You, C. H., Zhou, J. and Lam, K. Y. (1998) On the efficient implementation of fair non-repudiation. ACM Comput. Commun. Rev., 28, 50-60.
    • (1998) ACM Comput. Commun. Rev. , vol.28 , pp. 50-60
    • You, C.H.1    Zhou, J.2    Lam, K.Y.3
  • 17
    • 0000281241 scopus 로고    scopus 로고
    • Achieving non-repudiation of receipt
    • Zhang, N. and Shi, Q. (1996) Achieving non-repudiation of receipt. Comput. J., 39, 844-853.
    • (1996) Comput. J. , vol.39 , pp. 844-853
    • Zhang, N.1    Shi, Q.2
  • 18
    • 0029724319 scopus 로고    scopus 로고
    • A fair non-repudiation protocol
    • Oakland, CA, May, IEEE Computer Society Press, Los Alamitos, CA
    • Zhou, J. and Gollmann, D. (1996) A fair non-repudiation protocol. In Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May, pp. 55-61. IEEE Computer Society Press, Los Alamitos, CA.
    • (1996) Proc. IEEE Symp. on Security and Privacy , pp. 55-61
    • Zhou, J.1    Gollmann, D.2
  • 20
    • 85027123825 scopus 로고
    • New protocols for third-party-based authentication and secure broadcast
    • April, Fairfax, VA, ACM Press, New York
    • Gong, L. (1994) New protocols for third-party-based authentication and secure broadcast. In Proc. ACM Conference on Computer and Communication Security, April, Fairfax, VA, pp. 184-192. ACM Press, New York.
    • (1994) Proc. ACM Conference on Computer and Communication Security , pp. 184-192
    • Gong, L.1
  • 21
    • 0342832203 scopus 로고
    • Network time protocol specification and implementation
    • Available via email at mailserv@ds.internic.net
    • Network Working Group Report (1989) Network Time Protocol Specification and Implementation. Internet Request for Comment (RFC) 1119. Available via email at mailserv@ds.internic.net
    • (1989) Internet Request for Comment (RFC) , vol.1119
  • 22
    • 0003355302 scopus 로고
    • User datagram protocol
    • Available via email at mailserv@ds.internic.net
    • Postel, J. (1980) User Datagram Protocol. Internet Request for Comment (RFC) 768. Available via email at mailserv@ds.internic.net
    • (1980) Internet Request for Comment (RFC) , vol.768
    • Postel, J.1
  • 23
    • 0032623470 scopus 로고    scopus 로고
    • Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification
    • Gritzalis, S., Spinellis D. and Georgiadis, P. (1999) Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification. Comput. Commun., 22, 697-709.
    • (1999) Comput. Commun. , vol.22 , pp. 697-709
    • Gritzalis, S.1    Spinellis, D.2    Georgiadis, P.3
  • 24
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • Kemmerer, R., Meadows, C. and Millen, J. (1994) Three systems for cryptographic protocol analysis. J. Cryptol., 7, 79-130.
    • (1994) J. Cryptol. , vol.7 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.