메뉴 건너뛰기




Volumn 46, Issue 1, 2003, Pages 55-75

Fair exchange

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC DOCUMENT EXCHANGE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; INTERNET; NETWORK PROTOCOLS; ONLINE SYSTEMS;

EID: 0037244617     PISSN: 00104620     EISSN: None     Source Type: Journal    
DOI: 10.1093/comjnl/46.1.55     Document Type: Article
Times cited : (76)

References (79)
  • 3
    • 0002411371 scopus 로고
    • What good are models and what models are good?
    • In Mullender, S. (ed.); ch.; Addison-Wesley, Reading, MA
    • Schneider, F. B. (1993) What good are models and what models are good? In Mullender, S. (ed.), Distributed Systems (2nd edn), ch. 2, pp. 17-26. Addison-Wesley, Reading, MA.
    • (1993) Distributed Systems (2nd Edn) , pp. 17-26
    • Schneider, F.B.1
  • 8
    • 0022045868 scopus 로고
    • Impossibility of distributed consensus with one faulty process
    • Fischer, M. J., Lynch, N. A. and Peterson, M. S. (1985) Impossibility of distributed consensus with one faulty process. J. ACM, 32, 374-382.
    • (1985) J. ACM , vol.32 , pp. 374-382
    • Fischer, M.J.1    Lynch, N.A.2    Peterson, M.S.3
  • 11
    • 0003562406 scopus 로고    scopus 로고
    • A technical approach to privacy based on mobile agents protected by tamper-resistant hardware
    • Ph.D. Thesis, École Polytechnique Fédérale de Lausanne,Switzerland
    • Wilhelm, U. G. (1999) A Technical Approach to Privacy based on Mobile Agents protected by Tamper-resistant Hardware. Ph.D. Thesis, École Polytechnique Fédérale de Lausanne,Switzerland.
    • (1999)
    • Wilhelm, U.G.1
  • 15
    • 0012647694 scopus 로고    scopus 로고
    • Verifiable encryption and applications to group signatures and signature sharing
    • Technical Report RS-98-32, BRICS, Department of Computer Science, Aarhus University, Denmark
    • Camenisch, J. and Damgård, I. (1998) Verifiable Encryption and Applications to Group Signatures and Signature Sharing. Technical Report RS-98-32, BRICS, Department of Computer Science, Aarhus University, Denmark.
    • (1998)
    • Camenisch, J.1    Damgård, I.2
  • 17
    • 0031682832 scopus 로고    scopus 로고
    • Efficient and practical fair exchange protocols with off-line TTP
    • IEEE Computer Society Press, Los Alamitos, CA
    • Bao, F., Deng, R. H. and Mao, W. (1998) Efficient and practical fair exchange protocols with off-line TTP. In Proc. IEEE Symp. on Research in Security and Privacy, Oakland, CA, May, pp. 77-85. IEEE Computer Society Press, Los Alamitos, CA.
    • (1998) Proc. IEEE Symp. on Research in Security and Privacy, Oakland, CA, May , pp. 77-85
    • Bao, F.1    Deng, R.H.2    Mao, W.3
  • 22
    • 0012690893 scopus 로고    scopus 로고
    • Non-repudiation
    • Ph.D. Thesis, University of London
    • Zhou, J. (1996) Non-repudiation. Ph.D. Thesis, University of London.
    • (1996)
    • Zhou, J.1
  • 26
    • 0016949746 scopus 로고
    • A lattice model of secure information flow. Commun
    • Denning, D. E. (1976) A lattice model of secure information flow. Commun. ACM, 19, 236-243.
    • (1976) ACM , vol.19 , pp. 236-243
    • Denning, D.E.1
  • 27
    • 0003769568 scopus 로고    scopus 로고
    • Building blocks for secure services: Authenticated key transport and rational exchange protocols
    • Ph.D. Thesis, École Polytechnique Fédérale de Lausanne, no. 2511
    • Buttyán, L. (2001) Building Blocks for Secure Services: Authenticated Key Transport and Rational Exchange Protocols. Ph.D. Thesis, École Polytechnique Fédérale de Lausanne, no. 2511.
    • (2001)
    • Buttyán, L.1
  • 29
    • 0003752165 scopus 로고    scopus 로고
    • Secure reactive systems
    • Research Report RZ 3206 (#93252), IBM Reseach
    • Pfitzmann, B., Schunter, M. and Waidner, M. (2000) Secure Reactive Systems. Research Report RZ 3206 (#93252), IBM Reseach.
    • (2000)
    • Pfitzmann, B.1    Schunter, M.2    Waidner, M.3
  • 30
    • 4243960225 scopus 로고    scopus 로고
    • Optimistic fair exchange
    • Ph.D. Thesis, Universität des Saarlandes, Sarbrücken, Germany
    • Schunter, M. (2000) Optimistic Fair Exchange. Ph.D. Thesis, Universität des Saarlandes, Sarbrücken, Germany.
    • (2000)
    • Schunter, M.1
  • 33
    • 0017472779 scopus 로고
    • Proving the correctness of multiprocess programs
    • Lamport, L. (1977) Proving the correctness of multiprocess programs. IEEE Trans. on Software Eng., 3, 125-143.
    • (1977) IEEE Trans. on Software Eng. , vol.3 , pp. 125-143
    • Lamport, L.1
  • 35
    • 0024304753 scopus 로고
    • A simple approach to specifying concurrent systems
    • Lamport, L. (1989) A simple approach to specifying concurrent systems. Commun. ACM, 32, 32-45.
    • (1989) Commun. ACM , vol.32 , pp. 32-45
    • Lamport, L.1
  • 36
    • 0037076869 scopus 로고    scopus 로고
    • Finite-state analysis of two contract signing protocols
    • Shmatikov, V. and Mitchell, J. C. (2002) Finite-state analysis of two contract signing protocols. Theoret. Comput. Sci., 283, 419-450.
    • (2002) Theoret. Comput. Sci. , vol.283 , pp. 419-450
    • Shmatikov, V.1    Mitchell, J.C.2
  • 38
    • 4243796648 scopus 로고
    • Relations among public key signature systems
    • Technical Report 175, Computer Science Department, Technicon, Haifa, Israel
    • Even, S. and Yacobi, Y. (1980) Relations Among Public Key Signature Systems. Technical Report 175, Computer Science Department, Technicon, Haifa, Israel.
    • (1980)
    • Even, S.1    Yacobi, Y.2
  • 40
    • 0033752069 scopus 로고    scopus 로고
    • Failure detection and consensus in the crash recovery model
    • Aguilera, M. K., Chen, W. and Toueg, S. (2000) Failure detection and consensus in the crash recovery model. Distrib. Comput., 13, 99-125.
    • (2000) Distrib. Comput. , vol.13 , pp. 99-125
    • Aguilera, M.K.1    Chen, W.2    Toueg, S.3
  • 42
    • 0025568003 scopus 로고
    • Value exchange systems enabling security and unobservability
    • Bürk, H. and Pfitzmann, A. (1990) Value exchange systems enabling security and unobservability. Comput. Security, 9, 715-721.
    • (1990) Comput. Security , vol.9 , pp. 715-721
    • Bürk, H.1    Pfitzmann, A.2
  • 66
    • 33845223165 scopus 로고
    • A protocol for signing contracts
    • In Gersho, A. (ed.); ECE Report No. 82-04, UC. Santa Barbara, Department of Electrical and Computer Engineering
    • Even, S. (1982) A protocol for signing contracts. In Gersho, A. (ed.), Advances in Cryptology: A Report on CRYPTO 81, Santa Barbara, USA, August, pp. 148-153. ECE Report No. 82-04, UC. Santa Barbara, Department of Electrical and Computer Engineering.
    • (1982) Advances in Cryptology: A Report on CRYPTO 81, Santa Barbara, USA, August , pp. 148-153
    • Even, S.1
  • 67
    • 84976804419 scopus 로고
    • How to exchange (secret) keys
    • Blum, M. (1983) How to exchange (secret) keys. ACM Trans. Comput. Syst., 1, 175-193.
    • (1983) ACM Trans. Comput. Syst. , vol.1 , pp. 175-193
    • Blum, M.1
  • 71
    • 0020829007 scopus 로고
    • Transaction protection by beacons
    • Rabin, M. O. (1983) Transaction protection by beacons. J. Comput. Syst. Sci., 27, 256-267.
    • (1983) J. Comput. Syst. Sci. , vol.27 , pp. 256-267
    • Rabin, M.O.1
  • 76
  • 78
    • 85036718763 scopus 로고    scopus 로고
    • Formal verification of non-repudiation protocols - A game approach
    • Technical Report 431, Univerité Libre de Bruxelles, Belgium, presented at the Workshop on Formal Methods and Computer Security, Chicago, 2000
    • Kremer, S. and Raskin, J.-F. (2000) Formal Verification of Non-repudiation Protocols - A Game Approach. Technical Report 431, Univerité Libre de Bruxelles, Belgium, presented at the Workshop on Formal Methods and Computer Security, Chicago, 2000.
    • (2000)
    • Kremer, S.1    Raskin, J.-F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.