-
1
-
-
0030646696
-
Optimistic protocols for fair exchange
-
In Matsumoto, T. (ed.); ACM Press, New York
-
Asokan, N., Schunter, M. and Waidner, M. (1997) Optimistic protocols for fair exchange. In Matsumoto, T. (ed.), Proc. 4th ACM Conf. on Computer and Communications Security, Zürich, Switzerland, April, pp. 6-17. ACM Press, New York.
-
(1997)
Proc. 4th ACM Conf. on Computer and Communications Security, Zürich, Switzerland, April
, pp. 6-17
-
-
Asokan, N.1
Schunter, M.2
Waidner, M.3
-
2
-
-
84937578206
-
Simulating reliable links with unreliable links in the presence of process crashes
-
Springer
-
Basu, A., Charron-Bost, B. and Toueg, S. (1996) Simulating reliable links with unreliable links in the presence of process crashes. In Proc. 10th Int. Workshop on Distributed Algorithms (WDAG96), Bologna, Italy, October, pp. 105-122. Springer.
-
(1996)
Proc. 10th Int. Workshop on Distributed Algorithms (WDAG96), Bologna, Italy, October
, pp. 105-122
-
-
Basu, A.1
Charron-Bost, B.2
Toueg, S.3
-
3
-
-
0002411371
-
What good are models and what models are good?
-
In Mullender, S. (ed.); ch.; Addison-Wesley, Reading, MA
-
Schneider, F. B. (1993) What good are models and what models are good? In Mullender, S. (ed.), Distributed Systems (2nd edn), ch. 2, pp. 17-26. Addison-Wesley, Reading, MA.
-
(1993)
Distributed Systems (2nd Edn)
, pp. 17-26
-
-
Schneider, F.B.1
-
4
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
Menezes, A. J., Oorschot, P. C. V. and Vanstone, S. A. (1997) Handbook of Applied Cryptography. CRC Press, Boca Raton, FL.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Oorschot, P.C.V.2
Vanstone, S.A.3
-
6
-
-
35248876803
-
Exchanging goods and payment in electronic business transactions
-
Pagnia, H. and Vogt, H. (1999) Exchanging goods and payment in electronic business transactions. In Proc. Third European Research Seminar on Advances in Distributed Systems (ERSADS), Madeira Island, Portugal, April.
-
(1999)
Proc. Third European Research Seminar on Advances in Distributed Systems (ERSADS), Madeira Island, Portugal, April
-
-
Pagnia, H.1
Vogt, H.2
-
7
-
-
0031650188
-
Asynchronous protocols for optimistic fair exchange
-
IEEE Computer Society Press, Los Alamitos, CA
-
Asokan, N., Shoup, V. and Waidner, M. (1998). Asynchronous protocols for optimistic fair exchange. In Proc. IEEE Symp. on Research in Security and Privacy, Oakland, CA, May, pp. 86-99. IEEE Computer Society Press, Los Alamitos, CA.
-
(1998)
Proc. IEEE Symp. on Research in Security and Privacy, Oakland, CA, May
, pp. 86-99
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
8
-
-
0022045868
-
Impossibility of distributed consensus with one faulty process
-
Fischer, M. J., Lynch, N. A. and Peterson, M. S. (1985) Impossibility of distributed consensus with one faulty process. J. ACM, 32, 374-382.
-
(1985)
J. ACM
, vol.32
, pp. 374-382
-
-
Fischer, M.J.1
Lynch, N.A.2
Peterson, M.S.3
-
9
-
-
35248850205
-
Modular fair exchange protocols for electronic commerce
-
IEEE Computer Society Press, Los Alamitos, CA
-
Vogt, H., Pagnia, H. and Gärtner, F. C. (1999) Modular fair exchange protocols for electronic commerce. In Proc. 15th Ann. Computer Security Applications Conf., Phoenix, Arizona, December, pp. 3-11. IEEE Computer Society Press, Los Alamitos, CA.
-
(1999)
Proc. 15th Ann. Computer Security Applications Conf., Phoenix, Arizona, December
, pp. 3-11
-
-
Vogt, H.1
Pagnia, H.2
Gärtner, F.C.3
-
10
-
-
0033323373
-
Approaching a formal definition of fairness in electronic commerce
-
IEEE Computer Society Press, Los Alamitos, CA
-
Gärtner, F.C., Pagnia, H. and Vogt, H. (1999) Approaching a formal definition of fairness in electronic commerce. In Proc. Int. Workshop on Electronic Commerce (WELCOM '99), Lausanne, Switzerland, October, pp. 354-359. IEEE Computer Society Press, Los Alamitos, CA.
-
(1999)
Proc. Int. Workshop on Electronic Commerce (WELCOM '99), Lausanne, Switzerland, October
, pp. 354-359
-
-
Gärtner, F.C.1
Pagnia, H.2
Vogt, H.3
-
11
-
-
0003562406
-
A technical approach to privacy based on mobile agents protected by tamper-resistant hardware
-
Ph.D. Thesis, École Polytechnique Fédérale de Lausanne,Switzerland
-
Wilhelm, U. G. (1999) A Technical Approach to Privacy based on Mobile Agents protected by Tamper-resistant Hardware. Ph.D. Thesis, École Polytechnique Fédérale de Lausanne,Switzerland.
-
(1999)
-
-
Wilhelm, U.G.1
-
12
-
-
84957893011
-
Verifiable escrowed signature
-
Springer, Berlin
-
Mao, W. (1997) Verifiable escrowed signature. Information Security and Privacy - ACISP '97, Sydney, Australia, July. Lecture Notes in Computer Science, 1270, 240-248, Springer, Berlin.
-
(1997)
Information Security and Privacy - ACISP '97, Sydney, Australia, July. Lecture Notes in Computer Science
, vol.1270
, pp. 240-248
-
-
Mao, W.1
-
13
-
-
0033750375
-
Optimistic fair exchange of digital signatures
-
Asokan, N., Shop, V. and Waidner, M. (2000) Optimistic fair exchange of digital signatures. IEEE J. Selected Areas Commun., 18, 593-610.
-
(2000)
IEEE J. Selected Areas Commun.
, vol.18
, pp. 593-610
-
-
Asokan, N.1
Shop, V.2
Waidner, M.3
-
14
-
-
84957616594
-
Optimistic fair exchange of digital signatures
-
In Nybeerg, K. (ed.); Springer, Berlin
-
Asokan, N., Shoup, V. and Waidner, M. (1998) Optimistic fair exchange of digital signatures. In Nybeerg, K. (ed.), Advances in Cryptology - EUROCRYPT '98, Espoo, Finland, June. Lecture Notes in Computer Science, 1403, 591-606. Springer, Berlin.
-
(1998)
Advances in Cryptology - EUROCRYPT '98, Espoo, Finland, June. Lecture Notes in Computer Science
, vol.1403
, pp. 591-606
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
15
-
-
0012647694
-
Verifiable encryption and applications to group signatures and signature sharing
-
Technical Report RS-98-32, BRICS, Department of Computer Science, Aarhus University, Denmark
-
Camenisch, J. and Damgård, I. (1998) Verifiable Encryption and Applications to Group Signatures and Signature Sharing. Technical Report RS-98-32, BRICS, Department of Computer Science, Aarhus University, Denmark.
-
(1998)
-
-
Camenisch, J.1
Damgård, I.2
-
16
-
-
0033281266
-
Efficient verifiable encryption (and fair exchange) of digital signatures
-
ACM Press, New York
-
Ateniese, G. (1999) Efficient verifiable encryption (and fair exchange) of digital signatures. In Proc. 6th ACM Conf. on Computer and Communications Security (CCS '99), Singapore, November, pp. 138-146. ACM Press, New York.
-
(1999)
Proc. 6th ACM Conf. on Computer and Communications Security (CCS '99), Singapore, November
, pp. 138-146
-
-
Ateniese, G.1
-
17
-
-
0031682832
-
Efficient and practical fair exchange protocols with off-line TTP
-
IEEE Computer Society Press, Los Alamitos, CA
-
Bao, F., Deng, R. H. and Mao, W. (1998) Efficient and practical fair exchange protocols with off-line TTP. In Proc. IEEE Symp. on Research in Security and Privacy, Oakland, CA, May, pp. 77-85. IEEE Computer Society Press, Los Alamitos, CA.
-
(1998)
Proc. IEEE Symp. on Research in Security and Privacy, Oakland, CA, May
, pp. 77-85
-
-
Bao, F.1
Deng, R.H.2
Mao, W.3
-
18
-
-
84947720195
-
Off-line fair payment protocol using convertible signatures
-
Springer, Berlin
-
Boyd, C. and Foo, E. (1998) Off-line fair payment protocol using convertible signatures. In Advances in Cryptology - ASIACRYPT '98, Beijing, China, October. Lecture Notes in Computer Science, 1514, 271-285, Springer, Berlin.
-
(1998)
Advances in Cryptology - ASIACRYPT '98, Beijing, China, October. Lecture Notes in Computer Science
, vol.1514
, pp. 271-285
-
-
Boyd, C.1
Foo, E.2
-
19
-
-
84947787559
-
Efficient fair exchange with verifiable confirmation of signatures
-
In Ohta, K. and Pei, D. (eds.); Springer, Berlin
-
Chen, L. (1998) Efficient fair exchange with verifiable confirmation of signatures. In Ohta, K. and Pei, D. (eds.), Advances in Cryptology-ASIACRYPT '98, Beijing, China, October 18-22. Lecture Notes in Computer Science, 1514, 286-299. Springer, Berlin.
-
(1998)
Advances in Cryptology-ASIACRYPT '98, Beijing, China, October 18-22. Lecture Notes in Computer Science
, vol.1514
, pp. 286-299
-
-
Chen, L.1
-
20
-
-
84958769452
-
Convertible undeniable signatures
-
Springer, Berlin
-
Boyar, J., Chaum, D., Damgård, I. B. and Pedersen, T. P. (1990) Convertible undeniable signatures. In Menezes, A. J. and Vanstone, S. A. (eds.), Advances in Cryptology - CRYPTO '90, Santa Barbara, CA, August. Lecture Notes in Computer Science, 537, 189-205. Springer, Berlin.
-
(1990)
Advances in Cryptology - CRYPTO '90, Santa Barbara, CA, August. Lecture Notes in Computer Science
, vol.537
, pp. 189-205
-
-
Boyar, J.1
Chaum, D.2
Damgård, I.B.3
Pedersen, T.P.4
-
21
-
-
0020915882
-
Blind signatures for untraceable payments
-
Plenum, New York
-
Chaum, D. (1983) Blind signatures for untraceable payments. Advances in Cryptology - CRYPTO '82, Santa Barbara, CA, August, pp. 199-203. Plenum, New York.
-
(1983)
Advances in Cryptology - CRYPTO '82, Santa Barbara, CA, August
, pp. 199-203
-
-
Chaum, D.1
-
22
-
-
0012690893
-
Non-repudiation
-
Ph.D. Thesis, University of London
-
Zhou, J. (1996) Non-repudiation. Ph.D. Thesis, University of London.
-
(1996)
-
-
Zhou, J.1
-
23
-
-
84949477184
-
Using smart cards for fair exchange
-
Springer, Berlin
-
Vogt, H., Pagnia, H. and Gärtner, F. C. (2001) Using smart cards for fair exchange. In Electronic Commerce - WELCOM 2001, Heidelberg, November 16-17. Lecture Notes in Computer Science, 2232, 101-113. Springer, Berlin.
-
(2001)
Electronic Commerce - WELCOM 2001, Heidelberg, November 16-17. Lecture Notes in Computer Science
, vol.2232
, pp. 101-113
-
-
Vogt, H.1
Pagnia, H.2
Gärtner, F.C.3
-
24
-
-
0037377191
-
Supporting fair exchange in mobile environments
-
April
-
Vogt, H., Gärtner, F. C. and Pagnia, H. (2002) Supporting fair exchange in mobile environments. J. Mobile Networks Appl. (MONET), 8(2), April.
-
(2002)
J. Mobile Networks Appl. (MONET)
, vol.8
, Issue.2
-
-
Vogt, H.1
Gärtner, F.C.2
Pagnia, H.3
-
25
-
-
0030676227
-
Fair exchange with a semi-trusted third party
-
ACM Press, New York
-
Franklin, M. K. and Reiter, M. K. (1997) Fair exchange with a semi-trusted third party. 4th ACM Conf. on Computer and Communications Security, Zürich, Switzerland, April, pp. 1-5. ACM Press, New York.
-
(1997)
4th ACM Conf. on Computer and Communications Security, Zürich, Switzerland, April
, pp. 1-5
-
-
Franklin, M.K.1
Reiter, M.K.2
-
26
-
-
0016949746
-
A lattice model of secure information flow. Commun
-
Denning, D. E. (1976) A lattice model of secure information flow. Commun. ACM, 19, 236-243.
-
(1976)
ACM
, vol.19
, pp. 236-243
-
-
Denning, D.E.1
-
27
-
-
0003769568
-
Building blocks for secure services: Authenticated key transport and rational exchange protocols
-
Ph.D. Thesis, École Polytechnique Fédérale de Lausanne, no. 2511
-
Buttyán, L. (2001) Building Blocks for Secure Services: Authenticated Key Transport and Rational Exchange Protocols. Ph.D. Thesis, École Polytechnique Fédérale de Lausanne, no. 2511.
-
(2001)
-
-
Buttyán, L.1
-
29
-
-
0003752165
-
Secure reactive systems
-
Research Report RZ 3206 (#93252), IBM Reseach
-
Pfitzmann, B., Schunter, M. and Waidner, M. (2000) Secure Reactive Systems. Research Report RZ 3206 (#93252), IBM Reseach.
-
(2000)
-
-
Pfitzmann, B.1
Schunter, M.2
Waidner, M.3
-
30
-
-
4243960225
-
Optimistic fair exchange
-
Ph.D. Thesis, Universität des Saarlandes, Sarbrücken, Germany
-
Schunter, M. (2000) Optimistic Fair Exchange. Ph.D. Thesis, Universität des Saarlandes, Sarbrücken, Germany.
-
(2000)
-
-
Schunter, M.1
-
31
-
-
0032671775
-
A meta-notation for protocol analysis
-
IEEE Computer Society Press, Los Alamitos, CA
-
Cervesato, I., Durgin, N., Lincoln, P., Mitchell, J. and Scedrov, A. (1999) A meta-notation for protocol analysis. In Proc. 12th Ann. IEEE Computer Security Foundations Workshop - CSFW'99, Mordano, Italy, June, pp. 55-69. IEEE Computer Society Press, Los Alamitos, CA.
-
(1999)
Proc. 12th Ann. IEEE Computer Security Foundations Workshop - CSFW'99, Mordano, Italy, June
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
32
-
-
0035751922
-
Inductive methods and contract-signing protocols
-
In Samarati. P. (ed.); ACM Press. New York
-
Chadha, R., Kanovich, M. and Scedrov, A. (2001) Inductive methods and contract-signing protocols. In Samarati. P. (ed.), Proc. 8th ACM Conf. on Computer and Communication Security, Philadelphia, PA, November, pp. 176-185. ACM Press, New York.
-
(2001)
Proc. 8th ACM Conf. on Computer and Communication Security, Philadelphia, PA, November
, pp. 176-185
-
-
Chadha, R.1
Kanovich, M.2
Scedrov, A.3
-
33
-
-
0017472779
-
Proving the correctness of multiprocess programs
-
Lamport, L. (1977) Proving the correctness of multiprocess programs. IEEE Trans. on Software Eng., 3, 125-143.
-
(1977)
IEEE Trans. on Software Eng.
, vol.3
, pp. 125-143
-
-
Lamport, L.1
-
35
-
-
0024304753
-
A simple approach to specifying concurrent systems
-
Lamport, L. (1989) A simple approach to specifying concurrent systems. Commun. ACM, 32, 32-45.
-
(1989)
Commun. ACM
, vol.32
, pp. 32-45
-
-
Lamport, L.1
-
36
-
-
0037076869
-
Finite-state analysis of two contract signing protocols
-
Shmatikov, V. and Mitchell, J. C. (2002) Finite-state analysis of two contract signing protocols. Theoret. Comput. Sci., 283, 419-450.
-
(2002)
Theoret. Comput. Sci.
, vol.283
, pp. 419-450
-
-
Shmatikov, V.1
Mitchell, J.C.2
-
38
-
-
4243796648
-
Relations among public key signature systems
-
Technical Report 175, Computer Science Department, Technicon, Haifa, Israel
-
Even, S. and Yacobi, Y. (1980) Relations Among Public Key Signature Systems. Technical Report 175, Computer Science Department, Technicon, Haifa, Israel.
-
(1980)
-
-
Even, S.1
Yacobi, Y.2
-
39
-
-
84958060645
-
Secure group barter: Multi-party fair exchange with semi-trusted neutral parties
-
Springer, Berlin
-
Franklin, M. K. and Tsudik, G. (1998) Secure group barter: multi-party fair exchange with semi-trusted neutral parties. In Financial Cryptography - FC '98, Anguilla, British West Indies, February. Lecture Notes in Computer Science, 1465, 90-102, Springer, Berlin.
-
(1998)
Financial Cryptography - FC '98, Anguilla, British West Indies, February. Lecture Notes in Computer Science
, vol.1465
, pp. 90-102
-
-
Franklin, M.K.1
Tsudik, G.2
-
40
-
-
0033752069
-
Failure detection and consensus in the crash recovery model
-
Aguilera, M. K., Chen, W. and Toueg, S. (2000) Failure detection and consensus in the crash recovery model. Distrib. Comput., 13, 99-125.
-
(2000)
Distrib. Comput.
, vol.13
, pp. 99-125
-
-
Aguilera, M.K.1
Chen, W.2
Toueg, S.3
-
41
-
-
0031681561
-
Towards mobile cryptography
-
IEEE Computer Society Press
-
Sander, T. and Tschudin, C. (1998) Towards mobile cryptography. In Proc. IEEE Symp. on Research in Security and Privacy, Oakland, CA, May. IEEE Computer Society Press.
-
(1998)
Proc. IEEE Symp. on Research in Security and Privacy, Oakland, CA, May
-
-
Sander, T.1
Tschudin, C.2
-
42
-
-
0025568003
-
Value exchange systems enabling security and unobservability
-
Bürk, H. and Pfitzmann, A. (1990) Value exchange systems enabling security and unobservability. Comput. Security, 9, 715-721.
-
(1990)
Comput. Security
, vol.9
, pp. 715-721
-
-
Bürk, H.1
Pfitzmann, A.2
-
43
-
-
0029714694
-
Atomicity in electronic commerce
-
ACM Press, New York
-
Tygar, J. D. (1996) Atomicity in electronic commerce. In Proc. 15th Ann. ACM Symp. on Principles of Distributed Computing (PODC '96), Philadelphia, PA, May, pp. 8-26. ACM Press, New York.
-
(1996)
Proc. 15th Ann. ACM Symp. on Principles of Distributed Computing (PODC '96), Philadelphia, PA, May
, pp. 8-26
-
-
Tygar, J.D.1
-
44
-
-
84949206560
-
Optimistic fair exchange with transparent signature recovery
-
Springer, Berlin
-
Markowitch, O. and Saeednia, S. (2002) Optimistic fair exchange with transparent signature recovery. In Financial Cryptography - FC 2001, Grand Cayman, British West Indies, February 19-22. Lecture Notes in Computer Science, 2339, 339-350, Springer, Berlin.
-
(2002)
Financial Cryptography - FC 2001, Grand Cayman, British West Indies, February 19-22. Lecture Notes in Computer Science
, vol.2339
, pp. 339-350
-
-
Markowitch, O.1
Saeednia, S.2
-
45
-
-
0034590192
-
Avoiding loss of fairness owing to process crashes in fair data exchange protocols
-
IEEE Computer Society Press, Los Alamitos, CA
-
Liu, P., Ning, P. and Jajodia, S. (2000) Avoiding loss of fairness owing to process crashes in fair data exchange protocols. In Proc. IEEE Int. Conf. on Dependable Systems and Networks, Workshop on Dependability Despite Malicious Faults, New York, June, pp. 631-640. IEEE Computer Society Press, Los Alamitos, CA.
-
(2000)
Proc. IEEE Int. Conf. on Dependable Systems and Networks, Workshop on Dependability Despite Malicious Faults, New York, June
, pp. 631-640
-
-
Liu, P.1
Ning, P.2
Jajodia, S.3
-
46
-
-
84957060126
-
Abuse-free optimistic contract signing
-
In Wiener, M. (ed.); Springer, Berlin
-
Garay, J. A., Jakobson, M. and MacKenzie, P. (1999) Abuse-free optimistic contract signing. In Wiener, M. (ed.), Advances in Cryptology - CRYPTO '99, Santa Barbara, CA, August 15-19. Lecture Notes in Computer Science, 1666, 449-466, Springer, Berlin.
-
(1999)
Advances in Cryptology - CRYPTO '99, Santa Barbara, CA, August 15-19. Lecture Notes in Computer Science
, vol.1666
, pp. 449-466
-
-
Garay, J.A.1
Jakobson, M.2
MacKenzie, P.3
-
47
-
-
0029724319
-
A fair non-repudiation protocol
-
IEEE Computer Society Press
-
Zhou, J. and Gollmann, D. (1996) A fair non-repudiation protocol. In Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May, pp. 55-61. IEEE Computer Society Press.
-
(1996)
Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May
, pp. 55-61
-
-
Zhou, J.1
Gollmann, D.2
-
48
-
-
0030672290
-
An efficient non-repudiation protocol
-
IEEE Computer Society Press, Los Alamitos, CA
-
Zhou, J. and Gollmann, D. (1997) An efficient non-repudiation protocol. In Proc. 10th IEEE Computer Security Foundations Workshop, Rockport, MA, June, pp. 126-132. IEEE Computer Society Press, Los Alamitos, CA.
-
(1997)
Proc. 10th IEEE Computer Security Foundations Workshop, Rockport, MA, June
, pp. 126-132
-
-
Zhou, J.1
Gollmann, D.2
-
49
-
-
84961312272
-
Evolution of fair non-repudiation with TTP
-
Springer, Berlin
-
Zhou, J., Deng, R. and Bao, F. (1999) Evolution of fair non-repudiation with TTP. In Information Security and Privacy - ACISP '99, Wollongong, Australia, April 7-9. Lecture Notes in Computer Science, 1587, 258-269, Springer, Berlin.
-
(1999)
Information Security and Privacy - ACISP '99, Wollongong, Australia, April 7-9. Lecture Notes in Computer Science
, vol.1587
, pp. 258-269
-
-
Zhou, J.1
Deng, R.2
Bao, F.3
-
50
-
-
0003099569
-
Certified electronic mail
-
IEEE Computer Society Press, Los Alamitos, CA
-
Bahreman, A. and Tygar, J. (1994) Certified electronic mail. In Proc. ISOC Symp. on Network and Distributed Systems Security, San Diego, CA, February, pp. 3-19. IEEE Computer Society Press, Los Alamitos, CA.
-
(1994)
Proc. ISOC Symp. on Network and Distributed Systems Security, San Diego, CA, February
, pp. 3-19
-
-
Bahreman, A.1
Tygar, J.2
-
51
-
-
84949791102
-
Certified electronic mail
-
Springer, Berlin
-
Zhou, J. and Gollmann, D. (1996) Certified electronic mail. In Computer Security - ESORICS '96, Rome, Italy, September. Lecture Notes in Computer Science, 1146, 160-171. Springer, Berlin.
-
(1996)
Computer Security - ESORICS '96, Rome, Italy, September. Lecture Notes in Computer Science
, vol.1146
, pp. 160-171
-
-
Zhou, J.1
Gollmann, D.2
-
52
-
-
84974658695
-
A certified e-mail protocol
-
IEEE Computer Society Press, Los Alamitos, CA
-
Schneir, B. and Riordan, J. (1998) A certified e-mail protocol. In Proc. 14th Ann. Computer Security Applications Conf., Scottsdale, AZ, December, pp. 347-352. IEEE Computer Society Press, Los Alamitos, CA.
-
(1998)
Proc. 14th Ann. Computer Security Applications Conf., Scottsdale, AZ, December
, pp. 347-352
-
-
Schneir, B.1
Riordan, J.2
-
53
-
-
0004259552
-
-
Morgan Kaufmann, San Mateo, CA
-
Lynch, N. A., Merritt, M., Weihl, W. and Fekete, A. (1994) Atomic Transactions. Morgan Kaufmann, San Mateo, CA.
-
(1994)
Atomic Transactions
-
-
Lynch, N.A.1
Merritt, M.2
Weihl, W.3
Fekete, A.4
-
54
-
-
0003567016
-
-
Addison-Wesley, Reading, MA
-
Bernstein, P., Hadzilacos, V. and Goodman, N. (1987) Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading, MA.
-
(1987)
Concurrency Control and Recovery in Database Systems
-
-
Bernstein, P.1
Hadzilacos, V.2
Goodman, N.3
-
55
-
-
85036705463
-
Give me all I pay for - Execution guarantees in electronic commerce payment processes
-
Springer, Berlin
-
Schuldt, H., Popovici, A. and Schek, H.-J. (1999) Give me all I pay for - Execution guarantees in electronic commerce payment processes. In GI Workshop Informatik '99: Enterprise-wide and Cross-enterprise Workflow Management: Concepts, Systems, Applications, Paderborn, Germany, October 6. Springer, Berlin.
-
GI Workshop Informatik '99: Enterprise-Wide and Cross-Enterprise Workflow Management: Concepts, Systems, Applications, Paderborn, Germany, October 6
-
-
Schuldt, H.1
Popovici, A.2
Schek, H.-J.3
-
56
-
-
0029720084
-
Making trust explicit in distributed commerce transactions
-
IEEE Computer Society Press, Los Alamitos, CA
-
Ketchpel, S. P. and Garcia-Molina, H. (1996) Making trust explicit in distributed commerce transactions. In Proc. 16th IEEE International Conf. on Distributed Computing Systems (ICDCS96), Hong Kong, May, pp. 270-281. IEEE Computer Society Press, Los Alamitos, CA.
-
(1996)
Proc. 16th IEEE International Conf. on Distributed Computing Systems (ICDCS96), Hong Kong, May
, pp. 270-281
-
-
Ketchpel, S.P.1
Garcia-Molina, H.2
-
57
-
-
0012749133
-
Multi-party fair exchange with an off-line trusted neutral party
-
IEEE Computer Society Press, Los Alamitos, CA
-
Bao, F., Deng, R., Nguyen, K. Q. and Varadharajan, V. (1999) Multi-party fair exchange with an off-line trusted neutral party. In Proc. 10th Int. Workshop on Database and Expert Systems Applications, Florence, Italy, September 1-3, pp. 858-862. IEEE Computer Society Press, Los Alamitos, CA.
-
(1999)
Proc. 10th Int. Workshop on Database and Expert Systems Applications, Florence, Italy, September 1-3
, pp. 858-862
-
-
Bao, F.1
Deng, R.2
Nguyen, K.Q.3
Varadharajan, V.4
-
58
-
-
84959047912
-
A multi-party optimistic non-repudiation protocol
-
Springer, Berlin
-
Markowitch, O. and Kremer, S. (2000) A multi-party optimistic non-repudiation protocol. Information Security and Cryptology - ICISC 2000, Seoul, Korea, December. Lecture Notes in Computer Science, 2015, 109-122. Springer, Berlin.
-
(2000)
Information Security and Cryptology - ICISC 2000, Seoul, Korea, December. Lecture Notes in Computer Science
, vol.2015
, pp. 109-122
-
-
Markowitch, O.1
Kremer, S.2
-
59
-
-
84974574202
-
Round-optimal and abuse-free multi-party contract signing
-
Springer, Berlin
-
Baum-Waidner, B. and Waidner, M. (2000) Round-optimal and abuse-free multi-party contract signing. In 27th Int. Colloq. on Automata, Languages and Programming (ICALP '2000), Geneva, Switzerland, July. Lecture Notes in Computer Science, 1853, 524-535, Springer, Berlin.
-
(2000)
27th Int. Colloq. on Automata, Languages and Programming (ICALP '2000), Geneva, Switzerland, July. Lecture Notes in Computer Science
, vol.1853
, pp. 524-535
-
-
Baum-Waidner, B.1
Waidner, M.2
-
60
-
-
84949034319
-
Towards multiple-payment schemes for digital money
-
In Hirschfeld, R. (ed.); Springer
-
Pagnia, H. and Jansen, R. (1997) Towards multiple-payment schemes for digital money. In Hirschfeld, R. (ed.), Financial Cryptography: First Int. Conf., FC '97, Anguilla, British West Indies, February 24-28. Lecture Notes in Computer Science, 1318, 203-215, Springer.
-
(1997)
Financial Cryptography: First Int. Conf., FC '97, Anguilla, British West Indies, February 24-28. Lecture Notes in Computer Science
, vol.1318
, pp. 203-215
-
-
Pagnia, H.1
Jansen, R.2
-
61
-
-
0031621739
-
Weakly secret bit commitment: Applications to lotteries and fair exchange
-
IEEE Computer Society Press, Los Alamitos, CA
-
Syverson, P. (1998) Weakly secret bit commitment: applications to lotteries and fair exchange. In Proc. 11th IEEE Computer Security Foundations Workshop (CSFW '98), Rockport, Massachusetts, June, pp. 2-13. IEEE Computer Society Press, Los Alamitos, CA.
-
(1998)
Proc. 11th IEEE Computer Security Foundations Workshop (CSFW '98), Rockport, Massachusetts, June
, pp. 2-13
-
-
Syverson, P.1
-
62
-
-
84957613612
-
Ripping coins for fair exchange
-
In Guillou, L. C. and Quisquater, J.-J. (eds.); Springer, Berlin
-
Jakobsson, M. (1995) Ripping coins for fair exchange. In Guillou, L. C. and Quisquater, J.-J. (eds.), Advances in Cryptology - EUROCRYPT '95, St. Malo, France, May 21-25. Lecture Notes in Computer Science, 921, 220-230. Springer, Berlin.
-
(1995)
Advances in Cryptology - EUROCRYPT '95, St. Malo, France, May 21-25. Lecture Notes in Computer Science
, pp. 220-230
-
-
Jakobsson, M.1
-
63
-
-
23044530199
-
Rational exchange - A formal model based on game theory
-
Springer, Berlin
-
Buttyán, L. and Hubaux, J.-P. (2001) Rational exchange - A formal model based on game theory. Electronic Commerce - WELCOM 2001, Heidelberg, November. Lecture Notes in Computer Science, 2232, 114-126. Springer, Berlin.
-
(2001)
Electronic Commerce - WELCOM 2001, Heidelberg, November. Lecture Notes in Computer Science
, vol.2232
, pp. 114-126
-
-
Buttyán, L.1
Hubaux, J.-P.2
-
64
-
-
0002433210
-
Equilibrium analysis of the possibilities of unenforced exchange in multiagent systems
-
In Mellish, C. S. (ed.); Morgan Kaufmann, San Mateo, CA
-
Sandholm, T. W. and Lessser, V. R. (1995) Equilibrium analysis of the possibilities of unenforced exchange in multiagent systems. In Mellish, C. S. (ed.), Proc. Fourteenth Int. Joint Conf. on Artificial Intelligence, Montreal, Canada, August 20-25, pp. 694-703. Morgan Kaufmann, San Mateo, CA.
-
(1995)
Proc. Fourteenth Int. Joint Conf. on Artificial Intelligence, Montreal, Canada, August 20-25
, pp. 694-703
-
-
Sandholm, T.W.1
Lessser, V.R.2
-
65
-
-
84956868635
-
A secure pay-perview scheme for web-based video service
-
Springer, Berlin
-
Zhou, J. and Lam, K.-Y. (1999) A secure pay-perview scheme for web-based video service. In Public Key Cryptography - PKC '99, Kamakura, Japan, March. Lecture Notes in Computer Science, 1560, 315-326. Springer, Berlin.
-
(1999)
Public Key Cryptography - PKC '99, Kamakura, Japan, March. Lecture Notes in Computer Science
, vol.1560
, pp. 315-326
-
-
Zhou, J.1
Lam, K.-Y.2
-
66
-
-
33845223165
-
A protocol for signing contracts
-
In Gersho, A. (ed.); ECE Report No. 82-04, UC. Santa Barbara, Department of Electrical and Computer Engineering
-
Even, S. (1982) A protocol for signing contracts. In Gersho, A. (ed.), Advances in Cryptology: A Report on CRYPTO 81, Santa Barbara, USA, August, pp. 148-153. ECE Report No. 82-04, UC. Santa Barbara, Department of Electrical and Computer Engineering.
-
(1982)
Advances in Cryptology: A Report on CRYPTO 81, Santa Barbara, USA, August
, pp. 148-153
-
-
Even, S.1
-
67
-
-
84976804419
-
How to exchange (secret) keys
-
Blum, M. (1983) How to exchange (secret) keys. ACM Trans. Comput. Syst., 1, 175-193.
-
(1983)
ACM Trans. Comput. Syst.
, vol.1
, pp. 175-193
-
-
Blum, M.1
-
68
-
-
84949198248
-
Gradual and verifiable release of a secret
-
Springer, Berlin
-
Brickell, E. F., Chaum, D., Damgård, I. B. and van de Graaf, J. (1987) Gradual and verifiable release of a secret. In Advances in Cryptology - CRYPTO '87, Santa Barbara, CA, August. Lecture Notes in Computer Science, 293, 156-166. Springer, Berlin.
-
(1987)
Advances in Cryptology - CRYPTO '87, Santa Barbara, CA, August. Lecture Notes in Computer Science
, vol.293
, pp. 156-166
-
-
Brickell, E.F.1
Chaum, D.2
Damgård, I.B.3
Van De Graaf, J.4
-
69
-
-
84949192343
-
Practical and provably secure release of a secret and exchange of signatures
-
In Helleseth, T. (ed.); Springer, Berlin
-
Damgård, I. B. (1993) Practical and provably secure release of a secret and exchange of signatures. In Helleseth, T. (ed.) Advances in Cryptology - EUROCRYPT '93, Lofthus, Norway, May. Lecture Notes in Computer Science, 765, 200-217. Springer, Berlin.
-
(1993)
Advances in Cryptology - EUROCRYPT '93, Lofthus, Norway, May. Lecture Notes in Computer Science
, vol.765
, pp. 200-217
-
-
Damgård, I.B.1
-
70
-
-
84974588386
-
Time commitments
-
Springer, Berlin
-
Boneh, D. and Naor, M. (2000) Time commitments. In Advances in Cryptology - CRYPTO '2000, Santa Barbara, CA. Lecture Notes in Computer Science, 1880, 236-254. Springer, Berlin.
-
(2000)
Advances in Cryptology - CRYPTO '2000, Santa Barbara, CA. Lecture Notes in Computer Science
, pp. 236-254
-
-
Boneh, D.1
Naor, M.2
-
71
-
-
0020829007
-
Transaction protection by beacons
-
Rabin, M. O. (1983) Transaction protection by beacons. J. Comput. Syst. Sci., 27, 256-267.
-
(1983)
J. Comput. Syst. Sci.
, vol.27
, pp. 256-267
-
-
Rabin, M.O.1
-
72
-
-
0025246897
-
A fair protocol for signing contracts
-
Ben-Or, M., Goldreich, O., Micali, S. and Rivest R. L. (1990) A fair protocol for signing contracts. ACM Trans. Inform. Theory, 36, 40-46.
-
(1990)
ACM Trans. Inform. Theory
, vol.36
, pp. 40-46
-
-
Ben-Or, M.1
Goldreich, O.2
Micali, S.3
Rivest, R.L.4
-
74
-
-
84947938280
-
Abuse-free multi-party contract signing
-
Springer, Berlin
-
Garay, J. A. and MacKenzie, P. (1999) Abuse-free multi-party contract signing. In Distributed Computing - DISC '99, Bratislava, Slovak Republic, September 27-29. Lecture Notes in Computer Science, 1693, 151-165. Springer, Berlin.
-
(1999)
Distributed Computing - DISC '99, Bratislava, Slovak Republic, September 27-29. Lecture Notes in Computer Science
, vol.1693
, pp. 151-165
-
-
Garay, J.A.1
MacKenzie, P.2
-
75
-
-
84944317155
-
Analysis of abuse-free contract signing
-
Springer, Berlin
-
Shamtikov, V. and Michell, J. C. (2001) Analysis of abuse-free contract signing. In Financial Cryptography - FC 2000, Anguilla, British West Indies, February 21-24. Lecture Notes in Computer Science, 1962, 174-191. Springer, Berlin.
-
(2001)
Financial Cryptography - FC 2000, Anguilla, British West Indies, February 21-24. Lecture Notes in Computer Science
, vol.1962
, pp. 174-191
-
-
Shamtikov, V.1
Michell, J.C.2
-
76
-
-
0034873808
-
Successive approximation of abstract transition relations
-
IEEE Computer Society Press, Los Alamitos, CA
-
Das, S. and Dill, D. L. (2001) Successive approximation of abstract transition relations. In Proc. 16th Ann. IEEE Symp. on Logic in Computer Science, Boston, MA, June, pp. 51-58. IEEE Computer Society Press, Los Alamitos, CA.
-
(2001)
Proc. 16th Ann. IEEE Symp. on Logic in Computer Science, Boston, MA, June
, pp. 51-58
-
-
Das, S.1
Dill, D.L.2
-
77
-
-
84948779843
-
Game analysis of abuse-free contract signing
-
IEEE Computer Society Press, Los Alamitos, CA
-
Kremer, S. and Raskin, J-F. (2002) Game analysis of abuse-free contract signing. In Proc. 15th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, June. IEEE Computer Society Press, Los Alamitos, CA.
-
(2002)
Proc. 15th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, June
-
-
Kremer, S.1
Raskin, J.-F.2
-
78
-
-
85036718763
-
Formal verification of non-repudiation protocols - A game approach
-
Technical Report 431, Univerité Libre de Bruxelles, Belgium, presented at the Workshop on Formal Methods and Computer Security, Chicago, 2000
-
Kremer, S. and Raskin, J.-F. (2000) Formal Verification of Non-repudiation Protocols - A Game Approach. Technical Report 431, Univerité Libre de Bruxelles, Belgium, presented at the Workshop on Formal Methods and Computer Security, Chicago, 2000.
-
(2000)
-
-
Kremer, S.1
Raskin, J.-F.2
-
79
-
-
84944902924
-
Solving fair exchange with mobile agents
-
Springer, Berlin
-
Pagnia, H., Vogt, H., Gärtner, F. C. and Wilhelm, U. G. (2000) Solving fair exchange with mobile agents. In ASA/MA 2000, Zürich, Switzerland, September. Lecture Notes in Computer Science, 1882, 57-72. Springer, Berlin.
-
(2000)
ASA/MA 2000, Zürich, Switzerland, September. Lecture Notes in Computer Science
, vol.1882
, pp. 57-72
-
-
Pagnia, H.1
Vogt, H.2
Gärtner, F.C.3
Wilhelm, U.G.4
|