-
1
-
-
0033174376
-
Cyber view: How to steal millions in champ change
-
Aug.
-
P. Wallich, "Cyber view: How to steal millions in champ change," Sci. Amer., pp. 32-33, Aug. 1999.
-
(1999)
Sci. Amer.
, pp. 32-33
-
-
Wallich, P.1
-
2
-
-
0028532579
-
Why cryptosystems fail
-
Nov.
-
R. Anderson, "Why cryptosystems fail," Commun. ACM, vol. 37, no. 11, pp. 32-41, Nov. 1991.
-
(1991)
Commun. ACM
, vol.37
, Issue.11
, pp. 32-41
-
-
Anderson, R.1
-
4
-
-
0003068282
-
Security architecture for the internet protocol
-
Nov.
-
S. Kent and R. Atkinson, "Security architecture for the Internet Protocol,", Internet RFC 2401, Nov. 1998.
-
(1998)
Internet RFC 2401
-
-
Kent, S.1
Atkinson, R.2
-
5
-
-
0343315795
-
Mastercard and visa
-
"Mastercard and Visa," SET Secure Electronic Transactions Protocol, version 1.0 ed., May 1997, Book One: Business Specifications, Book Two: Technical Specification, Book Three: Formal Protocol Definition. Available from .
-
SET Secure Electronic Transactions Protocol, Version 1.0 Ed., May 1997, Book One: Business Specifications, Book Two: Technical Specification, Book Three: Formal Protocol Definition. Available from
-
-
-
6
-
-
0031238209
-
State of the art in electronic payment systems
-
Sept.
-
N. Asokan, P. Janson, M. Steiner, and M. Waidner, "State of the art in electronic payment systems," IEEE Computer, vol. 30, pp. 28-35, Sept. 1997, .
-
(1997)
IEEE Computer
, vol.30
, pp. 28-35
-
-
Asokan, N.1
Janson, P.2
Steiner, M.3
Waidner, M.4
-
9
-
-
0031701524
-
A security architecture for the internet protocol
-
P.-C. Cheng, J. Garay, A. Herzberg, and H. Krawczyk, "A security architecture for the internet protocol," IBM Syst. J., Special Issue Internet, updated version of [31], vol. 37, no. 1, pp. 42-60, 1998.
-
(1998)
IBM Syst. J., Special Issue Internet, Updated Version of [31]
, vol.37
, Issue.1
, pp. 42-60
-
-
Cheng, P.-C.1
Garay, J.2
Herzberg, A.3
Krawczyk, H.4
-
10
-
-
0031650188
-
Asynchronous protocols for optimistic fair exchange
-
Oakland, CA, May Revised version available, a minor mistake in the proceedings version was fixed
-
N. Asokan, V. Shoup, and M. Waidner, "Asynchronous protocols for optimistic fair exchange," in Proc. IEEE Symp. Res. Security Privacy, Research in Security and Privacy. Oakland, CA, May 1998, Revised version available, a minor mistake in the proceedings version was fixed, pp. 86-99.
-
(1998)
Proc. IEEE Symp. Res. Security Privacy, Research in Security and Privacy
, pp. 86-99
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
12
-
-
0003195066
-
The MD5 message-digest algorithm
-
Apr.
-
R. Rivest, "The MD5 message-digest algorithm,", Internet RFC 1321, Apr. 1992.
-
(1992)
Internet RFC 1321
-
-
Rivest, R.1
-
13
-
-
0343751658
-
NIST National Institute of Standards and Technology (computer systems laboratory) secure hash standard
-
Apr.
-
"NIST National Institute of Standards and Technology (Computer Systems laboratory) Secure hash standard," in Federal Information Processing Standards Publication FIPS FUB 180-1, Apr. 1995.
-
(1995)
Federal Information Processing Standards Publication FIPS FUB 180-1
-
-
-
14
-
-
35048891868
-
Keying hash functions for message authentication
-
Berlin, Germany: Springer-Verlag, number 1109 in Lecture Notes in Computer Science
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," in Advances in Cryptology - CRYPTO '96. Berlin, Germany: Springer-Verlag, number 1109 in Lecture Notes in Computer Science, 1996, pp. 1-15.
-
(1996)
Advances in Cryptology - CRYPTO '96
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
15
-
-
0342446318
-
Blinding of credit card numbers in the SET protocol
-
Anguilla, British West Indies: Int. Financial Cryptography Assoc. (IFCA), Feb.
-
H. Krawczyk, "Blinding of credit card numbers in the SET protocol," in Proc. 3rd Conf. Financial Cryptography (FC'99) . Anguilla, British West Indies: Int. Financial Cryptography Assoc. (IFCA), Feb. 1999.
-
(1999)
Proc. 3rd Conf. Financial Cryptography (FC'99)
-
-
Krawczyk, H.1
-
16
-
-
0001868672
-
Optimal asymmetric encryption - How to encrypt with rsa
-
I. B. Damgard, Ed. Berlin, Germany: Spring-Verlag, Lecture Notes in Computer Science, final (revised) version appeared Nov. 19
-
M. Bellare and P. Rogaway, "Optimal asymmetric encryption - How to encrypt with rsa," in Advances in Cryptology - EUROCRYPT '94, I. B. Damgard, Ed. Berlin, Germany: Spring-Verlag, 1994, Lecture Notes in Computer Science, final (revised) version appeared Nov. 19, 1995, pp. 92-111.
-
(1994)
Advances in Cryptology - EUROCRYPT '94
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
17
-
-
84870707379
-
A practical public key cryptosystem provably source against adaptive chosen ciphertext attack
-
H. Krawczyk, Ed. Berlin, Germany: Springer-Verlag, no. 1462 Lecture Notes in Computer Science, Aug.
-
R. Cramer and V. Shoup, "A practical public key cryptosystem provably source against adaptive chosen ciphertext attack," in Advances in Cryptology - CRYPTO '98, H. Krawczyk, Ed. Berlin, Germany: Springer-Verlag, no. 1462 Lecture Notes in Computer Science, Aug. 1998, pp. 13-25.
-
(1998)
Advances in Cryptology - CRYPTO '98
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
18
-
-
50149087559
-
Joint electronic payment initiative (jepi)
-
White paper, Apr.
-
E.-S. Chang and D. Dardailler, "Joint electronic payment initiative (jepi)," in JEPI: White paper, Apr. 1997.
-
(1997)
JEPI
-
-
Chang, E.-S.1
Dardailler, D.2
-
19
-
-
0343737853
-
Development of a secure electronic marketplace for Europe
-
E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Berlin, Germany: Springer-Verlag, no. 1146 in Lecture Notes in Computer Science, also published in: EDI Forum 9/2 (1996) Sept.
-
M. Waidner, "Development of a secure electronic marketplace for Europe," in in Proc. 4th European Symp. Res. Computer Science, E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Berlin, Germany: Springer-Verlag, no. 1146 in Lecture Notes in Computer Science, also published in: EDI Forum 9/2 (1996) 98-106, se also http://www.semper.org, Sept. 1996.
-
(1996)
Proc. 4th European Symp. Res. Computer Science
, pp. 98-106
-
-
Waidner, M.1
-
21
-
-
71849087704
-
Public-key cryptography and password protocols
-
S. Halevi and H. Krawczyk, "Public-key cryptography and password protocols," in ACM Trans. Inform. Syst. Security, vol. 2, 1999, Preliminary version in Proc. 5th ACM Conf. Computer Commun. Security, 1998, pp. 122-131., pp. 25-60.
-
(1999)
ACM Trans. Inform. Syst. Security
, vol.2
-
-
Halevi, S.1
Krawczyk, H.2
-
22
-
-
0032218224
-
-
S. Halevi and H. Krawczyk, "Public-key cryptography and password protocols," in ACM Trans. Inform. Syst. Security, vol. 2, 1999, Preliminary version in Proc. 5th ACM Conf. Computer Commun. Security, 1998, pp. 122-131., pp. 25-60.
-
(1998)
Proc. 5th ACM Conf. Computer Commun. Security
, pp. 122-131
-
-
-
24
-
-
85165852835
-
The millicent protocol for inexpensive electronic commerce
-
Boston, MA: MIT, Dec.
-
S. Glassman, M. Manasse, M. Abadi, P. Gauthier, and P. Sobalvarrog, "The millicent protocol for inexpensive electronic commerce," in Proc. 4th Int. Conf. World-Wide Web. Boston, MA: MIT, Dec. 1995.
-
(1995)
Proc. 4th Int. Conf. World-Wide Web
-
-
Glassman, S.1
Manasse, M.2
Abadi, M.3
Gauthier, P.4
Sobalvarrog, P.5
-
28
-
-
0342880857
-
Zürich iKP prototype: Protocol specification document
-
Feb.
-
G. Tsudik, "Zürich iKP prototype: Protocol specification document," in IBM Res.: Res. Rep. RZ 2792, Feb. 1996.
-
(1996)
IBM Res.: Res. Rep. RZ 2792
-
-
Tsudik, G.1
-
32
-
-
85084163550
-
Design and implementation of modular key management protocol and IP secure tunnel on AIX
-
Salt Lake City, UT, June
-
P. Chen, J. Garay, A. Herzberg, and H. Krawcczyk, "Design and implementation of modular key management protocol and IP Secure Tunnel on AIX," in Proc. 5th USENIX UNIX Security Symp., Salt Lake City, UT, June 1995.
-
(1995)
Proc. 5th USENIX UNIX Security Symp.
-
-
Chen, P.1
Garay, J.2
Herzberg, A.3
Krawcczyk, H.4
-
33
-
-
0000416796
-
Optimistic fair exchange of digital signatures
-
K. Nyberg, Ed. Berlin, Germany: Springer-Verlag, number 1403 in Lecture Notes in Computer Science
-
N. Asokan, V. Shoup, and M. Waidner, "Optimistic fair exchange of digital signatures," in Advances in Cryptology - EUROCRYPT '98, K. Nyberg, Ed. Berlin, Germany: Springer-Verlag, number 1403 in Lecture Notes in Computer Science, 1998.
-
(1998)
Advances in Cryptology - EUROCRYPT '98
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
35
-
-
0343315792
-
-
Mar. 30
-
N. Asokan, P. Janson, M. Steiner, and M. Waidner, Nikkei Computer (in Japanese), Mar. 30, 1998 , pp. 195-201.
-
(1998)
Nikkei Computer (in Japanese)
, pp. 195-201
-
-
Asokan, N.1
Janson, P.2
Steiner, M.3
Waidner, M.4
|