-
1
-
-
33645689192
-
Certified email with a light on-line trusted third party: Design and implementation
-
May
-
M. Abadi, N. Glew, B. Horne, and B. Pinkas. Certified email with a light on-line trusted third party: design and implementation. In International World Wide Web Conference Proceedings, pages 387-395, May 1991.
-
(1991)
International World Wide Web Conference Proceedings
, pp. 387-395
-
-
Abadi, M.1
Glew, N.2
Horne, B.3
Pinkas, B.4
-
2
-
-
0004226674
-
-
Department of Computer Science, University of Waterloo
-
N. Asokan. Fairness in Electronic Commerce. Department of Computer Science, University of Waterloo, 1998.
-
(1998)
Fairness in Electronic Commerce
-
-
Asokan, N.1
-
4
-
-
0033750375
-
Optimistic fair exchange of digital signatures
-
N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications, 18(4):593-610, 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 593-610
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
6
-
-
1142306658
-
Stateless-recipient certified e-mail system based on verifiable encryption
-
February
-
G. Ateniese and C. Nita-Rotaru. Stateless-recipient certified e-mail system based on verifiable encryption. In Proceedings of RSA 2002, February 2002.
-
(2002)
Proceedings of RSA 2002
-
-
Ateniese, G.1
Nita-Rotaru, C.2
-
10
-
-
84976804419
-
How to exchange (secret) keys
-
M. Blum. How to exchange (secret) keys. ACM Transactions on Computer Systems, 1(2):175-193, 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.2
, pp. 175-193
-
-
Blum, M.1
-
12
-
-
0002181960
-
Digital multisignatures
-
C. Boyd. Digital multisignatures. Cryptography and Coding, pages 241-246, 1989.
-
(1989)
Cryptography and Coding
, pp. 241-246
-
-
Boyd, C.1
-
14
-
-
84937441148
-
Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
-
J. Camenisch and I. Damgard. Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. In Advances in Cryptology - ASIACRYPT '00, pages 331-345, 2000.
-
(2000)
Advances in Cryptology - ASIACRYPT '00
, pp. 331-345
-
-
Camenisch, J.1
Damgard, I.2
-
15
-
-
0011390710
-
Proving in zero-knowledge that a number is the product of two safe primes
-
J. Camenisch and M. Michels. Proving in zero-knowledge that a number is the product of two safe primes. In Advances in Cryptology - EUROCRYPT '99, pages 106-121, 2000.
-
(2000)
Advances in Cryptology - EUROCRYPT '99
, pp. 106-121
-
-
Camenisch, J.1
Michels, M.2
-
16
-
-
85023982750
-
An improved protocol for demonstrating possession of a discrete logarithm and some generalizations
-
D. Chaum, J. H. Evertse, and J. van der Graaf. An improved protocol for demonstrating possession of a discrete logarithm and some generalizations. In Advances in Cryptology - EUROCRYPT '87, pages 127-141, 1987.
-
(1987)
Advances in Cryptology - EUROCRYPT '87
, pp. 127-141
-
-
Chaum, D.1
Evertse, J.H.2
Van der Graaf, J.3
-
17
-
-
84947787559
-
Efficient fair exchange with verifiable confirmation of signatures
-
L. Chen. Efficient fair exchange with verifiable confirmation of signatures. In Advances in Cryptology - ASIACRYPT '98, pages 286-299, 1998.
-
(1998)
Advances in Cryptology - ASIACRYPT '98
, pp. 286-299
-
-
Chen, L.1
-
20
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4):469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
21
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
23
-
-
0028508211
-
Group-oriented (t, n) threshold digital signature scheme and digital multisignature
-
L. Harn. Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proceedings - Computers and Digital Techniques, 141(5):307-313, 1994.
-
(1994)
IEE Proceedings - Computers and Digital Techniques
, vol.141
, Issue.5
, pp. 307-313
-
-
Harn, L.1
-
26
-
-
84944878354
-
-
CRC Press, Boca Raton, Florida
-
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, Florida, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
29
-
-
1142294445
-
Fair exchange in e-commerce
-
May
-
I. Ray and I. Ray. Fair exchange in e-commerce. ACM SIGecom Exchange, 3(2):9-17, May 2002.
-
(2002)
ACM SIGecom Exchange
, vol.3
, Issue.2
, pp. 9-17
-
-
Ray, I.1
Ray, I.2
-
30
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
|