-
1
-
-
35048875536
-
-
http://xml.apache.org/xerces-j/.
-
-
-
-
2
-
-
28044445560
-
M-commerce api package for mobile phones
-
Special Theme: Applications and Service Platforms for the Mobile User
-
I. G. Askoxylakis, D. D. Kastanis, and A. P. Traganitis. M-commerce api package for mobile phones. ERCIM newsletter 54,2003. Special Theme: Applications and Service Platforms for the Mobile User.
-
(2003)
ERCIM Newsletter
, vol.54
-
-
Askoxylakis, I.G.1
Kastanis, D.D.2
Traganitis, A.P.3
-
3
-
-
0028087488
-
Receipt-Free Secret-Ballot Election
-
J. Benaloh and D. Tuinstra. Receipt-Free Secret-Ballot Election. In Proc. of ACMSTOC'94, pages 544-553,1994.
-
(1994)
Proc. of ACMSTOC'94
, pp. 544-553
-
-
Benaloh, J.1
Tuinstra, D.2
-
4
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24(2):84-88,1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
5
-
-
0020915882
-
Blind Signatures for Untraceable Payments
-
Plenum, NY
-
D. Chaum. Blind Signatures for Untraceable Payments. In Proc. of Crypto'82, pages 199-203. Plenum, NY, 1983.
-
(1983)
Proc. of Crypto'82
, pp. 199-203
-
-
Chaum, D.1
-
6
-
-
0023861309
-
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
-
D. Chaum. The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology, l(l):65-75,1988.
-
(1988)
Journal of Cryptology
, vol.50
, Issue.50
, pp. 65-75
-
-
Chaum, D.1
-
7
-
-
0031348931
-
Sensor: A Security-Conscious Electronic Polling System for the Internet
-
L. Cranor and R. K. Cytron. Sensor: A Security-Conscious Electronic Polling System for the Internet. In Proc. of HICSS'97, 1997.
-
(1997)
Proc. of HICSS'97
-
-
Cranor, L.1
Cytron, R.K.2
-
8
-
-
84974597207
-
Non Interference for the Analysis of Cryptographic Protocols
-
R. Focardi, R. Gorrieri, and F. Martinelli. Non Interference for the Analysis of Cryptographic Protocols. In Proc. of ICALP'00, LNCS1853, 354-372,2000.
-
(2000)
Proc. of ICALP'00, LNCS1853
, pp. 354-372
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
9
-
-
0001292443
-
A Practical Secret Voting Scheme for Large Scale Election
-
A. Fujioka, T. Okamoto, and K. Ohta. A Practical Secret Voting Scheme for Large Scale Election. In Proc. of Auscrypt'92, volume LNCS 718, pages 244-260,1992.
-
(1992)
Proc. of Auscrypt'92, Volume LNCS 718
, pp. 244-260
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
11
-
-
0001334983
-
Towards a Practical, Secure, and Very Large Scale Online Election
-
IEEE Computer Society Press
-
J. Karro and J. Wang. Towards a Practical, Secure, and Very Large Scale Online Election. In Proc. of ACSAC'99, pages 161-169. IEEE Computer Society Press, 1999.
-
(1999)
Proc. of ACSAC'99
, pp. 161-169
-
-
Karro, J.1
Wang, J.2
-
15
-
-
84963595713
-
An Anonymous Electronic Voting Protocol for Voting over the Internet
-
IEEE Computer Society Press
-
I. Ray, I. Ray, and N. Narasimhamurthi. An Anonymous Electronic Voting Protocol for Voting over the Internet. In Proc. of WECWIS '01, pages 188-191. IEEE Computer Society Press, 2001.
-
(2001)
Proc. of WECWIS '01
, pp. 188-191
-
-
Ray, I.1
Ray, I.2
Narasimhamurthi, N.3
-
18
-
-
0003777431
-
-
Addison-Wesley Publishing Co.
-
P.Y.A. Ryan, S.A. Schneider, M.H. Goldsmith, G. Lowe, and A.W. Roscoe. Modelling and Analysis of Security Protocols. Addison-Wesley Publishing Co., 2000.
-
(2000)
Modelling and Analysis of Security Protocols
-
-
Ryan, P.Y.A.1
Schneider, S.A.2
Goldsmith, M.H.3
Lowe, G.4
Roscoe, A.W.5
|