-
1
-
-
33645689192
-
'Certified email with a light on-line trusted third party: Design and implementation'
-
Honolulu, Hawaii, USA
-
Abadi, M., Glew, N., Horne, B. and Pinkas, B. (2002) 'Certified email with a light on-line trusted third party: design and implementation', The Eleventh International World Wide Web Conference, Honolulu, Hawaii, USA.
-
(2002)
The Eleventh International World Wide Web Conference
-
-
Abadi, M.1
Glew, N.2
Horne, B.3
Pinkas, B.4
-
2
-
-
0030646696
-
'Optimistic protocols for fair exchange'
-
April
-
Asokan, N., Schunter, M. and Waider, M. (1997) 'Optimistic protocols for fair exchange', Proceedings of the 4th ACM Conference on Computer and Communication Security, April, pp. 4-17.
-
(1997)
Proceedings of the 4th ACM Conference on Computer and Communication Security
, pp. 4-17
-
-
Asokan, N.1
Schunter, M.2
Waider, M.3
-
3
-
-
0031682832
-
'Efficient and practical fair exchange protocols with off-line TTP'
-
Oakland, California
-
Bao, F., Deng R. and Mao, W. (1998) 'Efficient and practical fair exchange protocols with off-line TTP', Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California.
-
(1998)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Bao, F.1
Deng, R.2
Mao, W.3
-
4
-
-
0003628828
-
-
Prentice Hall, Englewood Cliffs, NJ
-
Ford, W. (1995) Computer Communications Security: Principles, Standard Protocols, and Techniques, Prentice Hall, Englewood Cliffs, NJ.
-
(1995)
Computer Communications Security: Principles, Standard Protocols, and Techniques
-
-
Ford, W.1
-
5
-
-
84900847325
-
'Improving fairness and privacy of Zhou-Gollmann's fair non-repudiation protocol'
-
IEEE Computer Society, Sep. 21-22
-
Kim, K. Park, S. and Baek, J. (1999) 'Improving fairness and privacy of Zhou-Gollmann's fair non-repudiation protocol', Proceedings of 1999 ICPP Workshops on Security (IWSEC), IEEE Computer Society, Sep. 21-22, pp. 140-145.
-
(1999)
Proceedings of 1999 ICPP Workshops on Security (IWSEC)
, pp. 140-145
-
-
Kim, K.1
Park, S.2
Baek, J.3
-
6
-
-
0037913144
-
-
Chapter 27, Security and Internet Commerce, Addison Wesley
-
Lewis, P., Bernstein, A. and Kifer, M. (2002) Databases and Transaction Processing: An Application-oriented Approach, Chapter 27, Security and Internet Commerce, Addison Wesley, pp.915-949.
-
(2002)
Databases and Transaction Processing: An Application-Oriented Approach
, pp. 915-949
-
-
Lewis, P.1
Bernstein, A.2
Kifer, M.3
-
7
-
-
0039013903
-
'Some guidelines for non-repudiation protocols'
-
October
-
Louridas, P. (2000) 'Some guidelines for non-repudiation protocols', ACM SIGCOMM Computer Communication Review, October, Vol. 30, No. 5.
-
(2000)
ACM SIGCOMM Computer Communication Review
, vol.30
, Issue.5
-
-
Louridas, P.1
-
10
-
-
1142294445
-
'Fair-exchange in e-commerce'
-
Spring
-
Ray, I. and Ray, I. (2002) 'Fair-exchange in e-commerce', SIGecom Exchanges, Spring, Vol. 3.2, pp.9-17.
-
(2002)
SIGecom Exchanges
, vol.3
, Issue.2
, pp. 9-17
-
-
Ray, I.1
Ray, I.2
|