-
1
-
-
35048891868
-
Keying hash functions for message authentication
-
N. Koblitz, editor, Advances in Cryptology, Crypto '96, Proceedings, Santa Barbara, California, U.S.A, August, Springer-Verlag
-
M. Bellare, R. Canetti, and H. Krawzcyk. Keying hash functions for message authentication. In N. Koblitz, editor, Advances in Cryptology - Crypto '96, Proceedings (Lecture Notes in Computer Science 1109), pages 1-15, Santa Barbara, California, U.S.A., August 1996. Springer-Verlag.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawzcyk, H.3
-
2
-
-
25844497297
-
The power of rsa inversion oracles and the security of chaum's rsa-based blind signature scheme
-
Financial Cryptography 2001
-
M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko. The power of rsa inversion oracles and the security of chaum's rsa-based blind signature scheme. In Financial Cryptography 2001. LNCS, 2001.
-
(2001)
LNCS
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
3
-
-
18844392414
-
Tapi: Transactions for accessing public infrastructure
-
Venice, Italy, September
-
M. Blaze, J. Ioannidis, S. Ioannidis, A. Keromytis, P. Nkander, and V. Prevelakis. Tapi: Transactions for accessing public infrastructure. In Proceedings of the 8th IFIP Personal Wireless Communications (PWC) Conference, Venice, Italy, September 2003.
-
(2003)
Proceedings of the 8th IFIP Personal Wireless Communications (PWC) Conference
-
-
Blaze, M.1
Ioannidis, J.2
Ioannidis, S.3
Keromytis, A.4
Nkander, P.5
Prevelakis, V.6
-
4
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
New York, July 16-21, ACM Press
-
N. Borisov, I. Goldberg, and D. Wagner. Intercepting mobile communications: The insecurity of 802.11. In Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MOBICOM-01), pages 180-188, New York, July 16-21 2001. ACM Press.
-
(2001)
Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MOBICOM-01)
, pp. 180-188
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
5
-
-
84957661460
-
Easy come-easy go divisible cash
-
Advances in Cryptology, Proceedings of Eurocrypt '98 , Elsinki, Finland, May 31-June 4, Springer-Verlag. International patent pending. Available at
-
A. Chan, Y. Frankel, and Y. Tsiounis. Easy come-easy go divisible cash. In Advances in Cryptology - Proceedings of Eurocrypt '98 (Lecture Notes in Computer Science), Elsinki, Finland, May 31-June 4 1998. Springer-Verlag. International patent pending. Available at http://www.ccs.neu.edu/home/yiannis/ pubs.html.
-
(1998)
Lecture Notes in Computer Science
-
-
Chan, A.1
Frankel, Y.2
Tsiounis, Y.3
-
6
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum, R.L. Rivest, and A. T. Sherman, editors, Santa Barbara, Plenum Press N. Y
-
D. Chaum. Blind signatures for untraceable payments. In D. Chaum, R.L. Rivest, and A. T. Sherman, editors, Advances in Cryptology. Proc. Crypto'82, pages 199-203, Santa Barbara, 1983. Plenum Press N. Y.
-
(1983)
Advances in Cryptology. Proc. Crypto'82
, pp. 199-203
-
-
Chaum, D.1
-
7
-
-
0022145479
-
Security without identification: Transaction systems to make Big Brother obsolete
-
October
-
D. Chaum. Security without identification: transaction systems to make Big Brother obsolete. Commun. ACM, 28(10):1030-1044, October 1985.
-
(1985)
Commun. ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
8
-
-
85032463527
-
Showing credentials without identification: Transfeering signatures between unconditionally unlinkable pseudonyms
-
J. Seberry and J. Pieprzyk, editors, Advances in Cryptology, Proc. of AUSCRYPT '90, Springer-Verlag
-
D. Chaum. Showing credentials without identification: Transfeering signatures between unconditionally unlinkable pseudonyms. In J. Seberry and J. Pieprzyk, editors, Advances in Cryptology, Proc. of AUSCRYPT '90 (Lecture Notes in Computer Science 453), pages 246-264. Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.453
, pp. 246-264
-
-
Chaum, D.1
-
9
-
-
84929273746
-
Untraceable electronic cash
-
Advances in Cryptology, Crypto '88 , Springer-Verlag
-
D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In Advances in Cryptology - Crypto '88 (Lecture Notes in Computer Science), pages 319-327. Springer-Verlag, 1990.
-
(1990)
Lecture Notes in Computer Science
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
11
-
-
0001872679
-
Anonymity control in e-cash
-
Proceedings of the 1st Financial Cryptography conference, Anguilla, BWI, February 24-28, Springer-Verlag. Available at
-
G. Davida, Y. Frankel, Y. Tsiounis, and M. Yung. Anonymity control in e-cash. In Proceedings of the 1st Financial Cryptography conference (Lecture Notes in Computer Science 1318), Anguilla, BWI, February 24-28 1997. Springer-Verlag. Available at http://www.ccs.neu.edu/home/yiannis/pubs.html.
-
(1997)
Lecture Notes in Computer Science
, vol.1318
-
-
Davida, G.1
Frankel, Y.2
Tsiounis, Y.3
Yung, M.4
-
12
-
-
84958045026
-
X-cash: Executable digital cash
-
Proceedings of Financial Cryptography '98, Springer
-
M. Jakobsson and A. Juels. X-cash: Executable digital cash. In Proceedings of Financial Cryptography '98, volume 1465, pages 16-27. Springer, LNCS, 1998.
-
(1998)
LNCS
, vol.1465
, pp. 16-27
-
-
Jakobsson, M.1
Juels, A.2
-
13
-
-
0029703641
-
Revokable and versatile electronic money (extended abstract)
-
ACM Press
-
M. Jakobsson and M. Yung. Revokable and versatile electronic money (extended abstract). In Proceedings of ACM-CCS 1996, pages 76-87. ACM Press, 1996.
-
(1996)
Proceedings of ACM-CCS 1996
, pp. 76-87
-
-
Jakobsson, M.1
Yung, M.2
-
14
-
-
84957610389
-
An efficient divisible electronic cash scheme
-
Don Coppersmith, editor, Advances in Cryptology, Proc. of Crypto '95, Springer-Verlag, Santa Barbara, California, U.S.A, August 27-31
-
T. Okamoto. An efficient divisible electronic cash scheme. In Don Coppersmith, editor, Advances in Cryptology, Proc. of Crypto '95 (Lecture Notes in Computer Science 963), pages 438-451. Springer-Verlag, 1995. Santa Barbara, California, U.S.A., August 27-31.
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 438-451
-
-
Okamoto, T.1
-
15
-
-
85024576592
-
Universal electronic cash
-
Advances in Cryptology, Crypto '91 , Springer-Verlag
-
T. Okamoto and K. Ohta. Universal electronic cash. In Advances in Cryptology - Crypto '91 (Lecture Notes in Computer Science), pages 324-337. Springer-Verlag, 1992.
-
(1992)
Lecture Notes in Computer Science
, pp. 324-337
-
-
Okamoto, T.1
Ohta, K.2
-
16
-
-
2242454096
-
-
PhD thesis, College of Computer Science, Northeastern University, Boston, MA, Available at
-
Y. Tsiounis. Efficient Electronic Cash: New Notions and Techniques. PhD thesis, College of Computer Science, Northeastern University, Boston, MA, 1997. Available at http://www.ccs.neu.edu/home/yiannis/ pubs.html.
-
(1997)
Efficient Electronic Cash: New Notions and Techniques
-
-
Tsiounis, Y.1
-
17
-
-
50749133265
-
On blind signatures and perfect crimes
-
October
-
B. von Solms and D. Naccache. On blind signatures and perfect crimes. Computers and Security, 11(6):581-583, October 1992.
-
(1992)
Computers and Security
, vol.11
, Issue.6
, pp. 581-583
-
-
von Solms, B.1
Naccache, D.2
|