-
1
-
-
84929273746
-
Untraceable electronic cash
-
Springer, Berlin
-
D. Chaum, A. Fiat and M. Naor, Untraceable electronic cash, in: Advances in Cryptology - CRYPTO 88, Lecture Notes in Computer Science 403, Springer, Berlin, pp. 319-327, 1988.
-
(1988)
In: Advances in Cryptology - CRYPTO 88, Lecture Notes in Computer Science
, vol.403
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
2
-
-
84985922619
-
Tracing traitors
-
in: Y.G. Desmedt (Ed.), Proc. CRYPTO 95 Springer, Berlin
-
B. Chor, A. Fiat and M. Naor, Tracing traitors, in: Y.G. Desmedt (Ed.), Proc. CRYPTO 95, Lecture Notes in Computer Science 839, Springer, Berlin, 1994, pp. 257-270.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
3
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
in: E.F. Brickell (Ed.), Advances in Cryptology - CRYPTO '92 Springer, Berlin
-
C. Dwork and M. Naor, Pricing via processing or combatting junk mail, in: E.F. Brickell (Ed.), Advances in Cryptology - CRYPTO '92, Lecture Notes in Computer Science 740, Springer, Berlin, 1992, pp. 139-147.
-
(1992)
Lecture Notes in Computer Science
, vol.740
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
4
-
-
84958676203
-
Proactive RSA
-
in: B.S. Kaliski Jr. (Ed.), Advances in Cryptology - CRYPTO '97, Springer, Berlin
-
Y. Frankel, P. Gemmell, P.D. MacKenzie and M. Yung, Proactive RSA, in: B.S. Kaliski Jr. (Ed.), Advances in Cryptology - CRYPTO '97, Lecture Notes in Computer Science 1294, Springer, Berlin, 1997, pp. 440-454.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 440-454
-
-
Frankel, Y.1
Gemmell, P.2
MacKenzie, P.D.3
Yung, M.4
-
5
-
-
84948988332
-
Auditable metering with lightweight security
-
in: R. Hirschfeld (Ed.), Financial Cryptography '97 Springer, Berlin
-
M. Franklin and D. Malkhi, Auditable metering with lightweight security, in: R. Hirschfeld (Ed.), Financial Cryptography '97, Lecture Notes in Computer Science 138, Springer, Berlin, 1997, pp. 151-160.
-
(1997)
Lecture Notes in Computer Science
, vol.138
, pp. 151-160
-
-
Franklin, M.1
Malkhi, D.2
-
6
-
-
0030646698
-
Proactive public key and signature systems
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk and M. Yung, Proactive public key and signature systems, in: ACM Conf. on Computers and Communication Security, 1997.
-
(1997)
In: ACM Conf. on Computers and Communication Security
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
8
-
-
84948948705
-
Applying anti-trust policies to increase trust in a versatile e-money system
-
in: R. Hirschfeld (Ed.), Financial Cryptography '97 Springer, Berlin
-
M. Jakobsson and M. Yung, Applying anti-trust policies to increase trust in a versatile e-money system, in: R. Hirschfeld (Ed.), Financial Cryptography '97, Lecture Notes in Computer Science 138, Springer, Berlin, 1997, pp. 217-238.
-
(1997)
Lecture Notes in Computer Science
, vol.138
, pp. 217-238
-
-
Jakobsson, M.1
Yung, M.2
-
9
-
-
85021885064
-
Sales promotions on the Internet
-
USENIX
-
M. Kumar, A. Rangachari, A. Jhingram and R. Mohan, Sales promotions on the Internet, in: Proc. 3rd Usenix Workshop on Electronic Commerce, USENIX, 1998, pp. 167-176.
-
(1998)
In: Proc. 3rd Usenix Workshop on Electronic Commerce
, pp. 167-176
-
-
Kumar, M.1
Rangachari, A.2
Jhingram, A.3
Mohan, R.4
-
10
-
-
84957701776
-
Secure and efficient metering
-
in: K. Nyberg (Ed.), Advances in Cryptology - EUROCRYPT '98 Springer, Berlin
-
M. Naor and B. Pinkas, Secure and efficient metering, in: K. Nyberg (Ed.), Advances in Cryptology - EUROCRYPT '98, Lecture Notes in Computer Science 1403, Springer, Berlin, 1998, pp. 576-590.
-
(1998)
Lecture Notes in Computer Science
, vol.1403
, pp. 576-590
-
-
Naor, M.1
Pinkas, B.2
-
11
-
-
85031560057
-
-
Newspaper Association of America, All media ad volume
-
Newspaper Association of America, All media ad volume, 1997, http://www.naa.org/marketscope/databank/index.html.
-
(1997)
-
-
-
13
-
-
85027164480
-
How to withstand mobile virus attacks (extended abstract)
-
Montreal, Quebec, 19-21 August
-
R. Ostrovsky and M. Yung, How to withstand mobile virus attacks (extended abstract), in: Proc. 10th Annual ACM Symp. on Principles of Distributed Computing, Montreal, Quebec, 19-21 August, 1991, pp. 51-59.
-
(1991)
In: Proc. 10th Annual ACM Symp. on Principles of Distributed Computing
, pp. 51-59
-
-
Ostrovsky, R.1
Yung, M.2
-
15
-
-
84957689308
-
A simplified approach to threshold and proactive RSA
-
in: H. Krawczyk (Ed.), Advances in Cryptology - CRYPTO '98 Springer, Berlin
-
T. Rabin, A simplified approach to threshold and proactive RSA, in: H. Krawczyk (Ed.), Advances in Cryptology - CRYPTO '98, Lecture Notes in Computer Science 1462, Springer, Berlin, 1998, pp. 89-104.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 89-104
-
-
Rabin, T.1
-
16
-
-
0042755750
-
Detecting hit shaving in click-through payment schemes
-
USENIX
-
M.K. Reiter, V. Anupam and A. Mayer, Detecting hit shaving in click-through payment schemes, in: Proc. 3rd USENIX Workshop on Electronic Commerce, USENIX, 1998, pp. 155-166.
-
(1998)
In: Proc. 3rd USENIX Workshop on Electronic Commerce
, pp. 155-166
-
-
Reiter, M.K.1
Anupam, V.2
Mayer, A.3
-
17
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir and L.M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM 21 (2) (1978) 120-126.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
18
-
-
12344258539
-
Efficient signature generation by smart cards
-
C.P. Schnorr, Efficient signature generation by smart cards, Journal of Cryptology 4 (1991) 161-174.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.P.1
-
19
-
-
85031565842
-
-
World Bank
-
World Bank, http://www.worldbank.org.
-
-
-
|