메뉴 건너뛰기




Volumn 1729, Issue , 1999, Pages 1-13

Spending programs: A tool for flexible micropayments

Author keywords

Electronic commerce; Hash chain; Hash functions; Micropayments; Spending program

Indexed keywords

ELECTRONIC COMMERCE; HASH FUNCTIONS; SECURITY OF DATA;

EID: 35048827793     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-47790-x_1     Document Type: Conference Paper
Times cited : (2)

References (17)
  • 3
    • 84948177277 scopus 로고    scopus 로고
    • CyberCash Inc., http://www.cybercash.com
  • 4
    • 85021973877 scopus 로고
    • Software run-time protection: A cryptographic issue
    • ed. I. B. Damgaard, Springer- Verlag
    • J. Domingo-Ferrer, “Software run-time protection: a cryptographic issue”, in Advances in Cryptology - Eurocrypt’90, ed. I. B. Damgaard, LNCS 473, Springer- Verlag, 1991, pp. 474-480.
    • (1991) Advances in Cryptology - Eurocrypt’90 , vol.473 , pp. 474-480
    • Domingo-Ferrer, J.1
  • 5
    • 0026255685 scopus 로고
    • Algorithm-sequenced access control
    • J. Domingo-Ferrer, “Algorithm-sequenced access control”, Computers & Security, vol. 10, no. 7, nov. 1991, pp. 639-652.
    • (1991) Computers & Security , vol.10 , Issue.7 , pp. 639-652
    • Domingo-Ferrer, J.1
  • 6
    • 84948133790 scopus 로고    scopus 로고
    • e-cash, http://www.digicash.com
  • 9
    • 0043190723 scopus 로고    scopus 로고
    • PayTree: “Amortized-signature for flexible micropayments”
    • Oakland CA, Nov
    • C. Jutla and M. Yung, “PayTree: “Amortized-signature” for flexible micropayments”, in Second USENIX Workshop on Electronic Commerce, Oakland CA, Nov. 1996.
    • (1996) Second USENIX Workshop on Electronic Commerce
    • Jutla, C.1    Yung, M.2
  • 10
    • 84948143134 scopus 로고
    • The evolution of the Kerberos authentication service
    • Distributed Open Systems, eds. F. Brazier and D. Johansen, Los Alami- tos, CA: IEEE Computer Society Press, 1994
    • J. Kohl, B. Neuman and T. Ts’o, “The evolution of the Kerberos authentication service”, in Distributed Open Systems, eds. F. Brazier and D. Johansen, Los Alami- tos, CA: IEEE Computer Society Press, 1994. See also RFC 1510: The Kerberos Network Authentication System, Internet Activities Board, 1993.
    • (1993) See also RFC 1510: The Kerberos Network Authentication System, Internet Activities Board
    • Kohl, J.1    Neuman, B.2    Ts’O, T.3
  • 11
    • 0019634370 scopus 로고
    • Password authentication with insecure communications
    • L. Lamport, “Password authentication with insecure communications”, Communications of the ACM, vol. 24, no. 11, 1981, pp. 770-772.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 12
    • 84978927549 scopus 로고    scopus 로고
    • Electronic payments of small amounts”
    • (April 1996), ed. M. Lomas, Springer-Verlag
    • T. P. Pedersen, “Electronic payments of small amounts”, in Security Protocols (April 1996), ed. M. Lomas, LNCS 1189, Springer-Verlag, 1997, pp. 59-68.
    • (1997) Security Protocols , vol.1189 , pp. 59-68
    • Pedersen, T.P.1
  • 13
  • 15
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, vol. 21, no. 2, 1978, pp. 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 16
    • 84948145853 scopus 로고    scopus 로고
    • Secure Electronic Transactions. http://www.mastercard.com/set/set.htm
  • 17
    • 0003629991 scopus 로고
    • U. S. National Institute of Standards and Technology
    • Secure Hash Standard, U. S. National Institute of Standards and Technology, FIPS PUB 180-1, April 1995. http://csrc.ncsl.nist.gov/fips/fip180-1.txt
    • (1995) FIPS PUB , pp. 180-181


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.