-
1
-
-
0033731024
-
Design, implementation and deployment of the iKP secure electronic payment system
-
Bellare, M., Garay, J.A., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Herreweghen, E.V., Waidner, M.; Design, implementation and deployment of the iKP secure electronic payment system. IEEE Journal of Selected Areas in Communications 18 (2000) 611-627
-
(2000)
IEEE Journal of Selected Areas in Communications
, vol.18
, pp. 611-627
-
-
Bellare, M.1
Garay, J.A.2
Hauser, R.3
Herzberg, A.4
Krawczyk, H.5
Steiner, M.6
Tsudik, G.7
Herreweghen, E.V.8
Waidner, M.9
-
3
-
-
84944900444
-
Micropayments revisited
-
Progress in Cryptology-CT-RSA 2002. Springer
-
Micali, S., Rivest, R.L.; Micropayments revisited. In: Progress in Cryptology-CT-RSA 2002. LNCS 2271, Springer (2002) 149-163
-
(2002)
LNCS
, vol.2271
, pp. 149-163
-
-
Micali, S.1
Rivest, R.L.2
-
4
-
-
84958780603
-
Authentication and payment in future mobile systems
-
Computer Security - ESORICS 98. Springer-Verlag
-
Horn, G., Preneel, B.; Authentication and payment in future mobile systems. In: Computer Security - ESORICS 98. LNCS 1485, Springer-Verlag (1998) 277-293
-
(1998)
LNCS
, vol.1485
, pp. 277-293
-
-
Horn, G.1
Preneel, B.2
-
6
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
Lowe, G.; An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56 (1995) 131-133
-
(1995)
Inf. Process. Lett.
, vol.56
, pp. 131-133
-
-
Lowe, G.1
-
7
-
-
84855617547
-
-
CafeOBJ web page
-
CafeOBJ: CafeOBJ web page. http://www.ldl.jaist.ac.jp/cafeobj/ (2001)
-
(2001)
-
-
-
9
-
-
19044393469
-
Rewriting-based verification of authentication protocols
-
WRLA '02. Elsevier Science Publishers
-
Ogata, K., Futatsugi, K.; Rewriting-based verification of authentication protocols. In: WRLA '02. Volume 71 of ENTCS., Elsevier Science Publishers (2002)
-
(2002)
ENTCS
, vol.71
-
-
Ogata, K.1
Futatsugi, K.2
-
12
-
-
84978927549
-
Electronic payments of small amounts
-
Security Protocols. Springer-Verlag
-
Pedersen, T.P.; Electronic payments of small amounts. In: Security Protocols. LNCS 1189, Springer-Verlag (1996) 59-68
-
(1996)
LNCS
, vol.1189
, pp. 59-68
-
-
Pedersen, T.P.1
-
13
-
-
0019634370
-
Passward authentication with insecure communications
-
Lamport, L.; Passward authentication with insecure communications. Comm. ACM 24 (1981) 770-772
-
(1981)
Comm. ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
14
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., Yao, A.C.; On the security of public key protocols. IEEE Trans. Inform. Theory IT-29 (1983) 198-208
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
15
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson, L.C.; The inductive approach to verifying cryptographic protocols. J. Comput. Security 6 (1998) 85-128
-
(1998)
J. Comput. Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
16
-
-
0000937825
-
Verifying authentication protocols in CSP
-
Schneider, S.; Verifying authentication protocols in CSP. IEEE Trans. Softw. Eng. 24 (1998) 741-758
-
(1998)
IEEE Trans. Softw. Eng.
, vol.24
, pp. 741-758
-
-
Schneider, S.1
|