-
1
-
-
3843067184
-
-
http:// www.esat.kuleuveu.ac.be/bosselae/ripemdl60.htral
-
A. Bosselaer, "The hash function RIPEMD-160," http:// www.esat.kuleuveu.ac.be/"bosselae/ripemdl60.htral
-
The Hash Function RIPEMD-160
-
-
Bosselaer, A.1
-
3
-
-
0025849585
-
-
J. Cryptology, vol.3, no.2, pp.99-111, 1991
-
S. Haber and W.S. Stornetta, "How to time-stamp a digital document," J. Cryptology, vol.3, no.2, pp.99-111, 1991
-
How to Time-stamp a Digital Document
-
-
Haber, S.1
Stornetta, S.W.2
-
4
-
-
85094835061
-
-
Third USENIX Workshop on Electronic Commerce Proceedings, pp.61-74, 1998
-
M. Harkavy, J.D. Tygar, and H. Kikuchi, "Electronic auctions with private bids," Third USENIX Workshop on Electronic Commerce Proceedings, pp.61-74, 1998
-
Electronic Auctions with Private Bids
-
-
Harkavy, M.1
Tygar, J.D.2
Kikuchi, H.3
-
5
-
-
0031679773
-
-
IEICE Trans. Fundamentals, vol.ESl-A, no.l, pp.20-27, Jan. 1998
-
M. Kudo, "Secure electronic sealed-bid auction protocol with public key cryptography," IEICE Trans. Fundamentals, vol.ESl-A, no.l, pp.20-27, Jan. 1998
-
Secure Electronic Sealed-bid Auction Protocol with Public Key Cryptography
-
-
Kudo, M.1
-
6
-
-
33749923372
-
-
Proc. First IEEE Work- shop on Dependable and Real-Time E-Commerce Systems, pp.62-69, 1998
-
H. Kikuchi, M. Harkavy, and J.D. Tygar, "Multi-round anonymous auction protocols," Proc. First IEEE Work- shop on Dependable and Real-Time E-Commerce Systems, pp.62-69, 1998
-
Multi-round Anonymous Auction Protocols
-
-
Kikuchi, H.1
Harkavy, M.2
Tygar, J.D.3
-
7
-
-
0019634370
-
-
Commun. ACM, vol.24, no.ll, pp.770-772, Nov. 1981
-
L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol.24, no.ll, pp.770-772, Nov. 1981
-
Password Authentication with Insecure Communication
-
-
Lamport, L.1
-
8
-
-
84883898504
-
-
Proc. ACM Conference on E-commerce, pp.129-139, 1999
-
M. Naor, B. Pinkas, and R. Sumner, "Auctions and mechanism design," Proc. ACM Conference on E-commerce, pp.129-139, 1999
-
Auctions and Mechanism Design
-
-
Naor, M.1
Pinkas, B.2
Sumner, R.3
-
10
-
-
35248870807
-
-
Public Key Cryptography2000, volume 1751 of Lecture Notes in Computer Science, pp.422-432, Springer-Verlag, Melbourne, 2000
-
K. Sako, "An auction protocol which hides bids of losers," Public Key Cryptography2000, volume 1751 of Lecture Notes in Computer Science, pp.422-432, Springer-Verlag, Melbourne, 2000
-
An Auction Protocol which Hides Bids of Losers
-
-
Sako, K.1
-
11
-
-
33749899730
-
-
Proc. 1999 International Workshop on Cryptographic Techniques and E-Commerce (M. Blum and C.H. Lee ed.), pp.180-187, July 1999 (See, http://www.cs.cityu.edu.hk/~cryptec/ cryptec.htm). Proc. 1999 International Workshop on Cryptographic Techniques and E-Commerce, M. Blum and C.H. Lee, eds., pp.180-187
-
K. Sakurai and S. Miyazaki, "A bulletin-board based digital auction scheme with bidding down strategy," Proc. 1999 International Workshop on Cryptographic Techniques and E-Commerce (M. Blum and C.H. Lee ed.), pp.180-187, July 1999 (See, http://www.cs.cityu.edu.hk/~cryptec/ cryptec.htm). Proc. 1999 International Workshop on Cryptographic Techniques and E-Commerce, M. Blum and C.H. Lee, eds., pp.180-187
-
A Bulletin-board Based Digital Auction Scheme with Bidding Down Strategy
-
-
Sakurai, K.1
Miyazaki, S.2
-
13
-
-
33749913420
-
-
http://indigo.ie/ mscottJ.
-
Shamus Software Ltd., "Benchmarks," http://indigo.ie/ "mscottJ.
-
Benchmarks
-
-
Ltd, S.S.1
|