-
1
-
-
26144449189
-
The risks of key recovery, key escrow, and trusted third-party encryption
-
Online available at
-
H. Abelson, R. Anderson, S. Bellovin, J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, P. Neumann, R. Rivest, J. Schiller, and B. Schneier. The risks of key recovery, key escrow, and trusted third-party encryption. Online available at http://www.cdt.org/crypto/risks98, 1998. An earlier version appeared in World Wide Web Journal, v.2, n.3, 1997, pages 241–257.
-
(1998)
An Earlier Version Appeared in World Wide Web Journal
, vol.2
, Issue.3
, pp. 241-257
-
-
Abelson, H.1
Anderson, R.2
Bellovin, S.3
Benaloh, J.4
Blaze, M.5
Diffie, W.6
Gilmore, J.7
Neumann, P.8
Rivest, R.9
Schiller, J.10
Schneier, B.11
-
2
-
-
0020915882
-
Blind signatures for untraceable payments
-
Plenum
-
D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology - CRYPTO ’82, pages 199–203. Plenum, 1983.
-
(1983)
Advances in Cryptology - CRYPTO ’82
, pp. 199-203
-
-
Chaum, D.1
-
4
-
-
84949745296
-
Digital payment systems with passive anonymity-revoking trustees
-
Springer-Verlag
-
J. Camenisch, U. Maurer, and M. Stadler. Digital payment systems with passive anonymity-revoking trustees. In Computer Security - ESORICS ’96, volume 1146 of Lecture Notes in Computer Science, pages 31–43. Springer-Verlag, 1996.
-
(1996)
Computer Security - ESORICS ’96, Volume 1146 of Lecture Notes in Computer Science
, pp. 31-43
-
-
Camenisch, J.1
Maurer, U.2
Stadler, M.3
-
6
-
-
0001872679
-
Anonymity control in ecash systems
-
Springer-Verlag
-
G. Davida, Y. Frankel, Y. Tsiounis, and M. Young. Anonymity control in ecash systems. In Financial Cryptography ’97, volume 1318 of Lecture Notes in Computer Science, pages 1–16. Springer-Verlag, 1997.
-
(1997)
Financial Cryptography ’97, Volume 1318 of Lecture Notes in Computer Science
, pp. 1-16
-
-
Davida, G.1
Frankel, Y.2
Tsiounis, Y.3
Young, M.4
-
9
-
-
84955560661
-
Indirect discourse proofs: Achieving efficient fair off-line e-cash
-
Springer-Verlag
-
Y. Frankel, Y. Tsiounis, and M. Young. “Indirect discourse proofs”: Achieving efficient fair off-line e-cash. In Advances in Cryptology – ASIACRYPT ’96, volume 1163 of Lecture Notes in Computer Science, pages 286–300. Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology – ASIACRYPT ’96, Volume 1163 of Lecture Notes in Computer Science
, pp. 286-300
-
-
Frankel, Y.1
Tsiounis, Y.2
Young, M.3
-
10
-
-
84958670348
-
RSA-based undeniable signatures
-
Springer-Verlag
-
R. Gennaro, H. Krawczyk, and T. Rabin. RSA-based undeniable signatures. In Advances in Cryptology - CRYPTO ’97, volume 1294 of Lecture Notes in Computer Science, pages 132–149. Springer-Verlag, 1997.
-
(1997)
Advances in Cryptology - CRYPTO ’97, Volume 1294 of Lecture Notes in Computer Science
, pp. 132-149
-
-
Gennaro, R.1
Krawczyk, H.2
Rabin, T.3
-
11
-
-
84927752554
-
Designated verifier proofs and their applications
-
Springer-Verlag
-
M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In Advances in Cryptology - EUROCRYPT ’96, volume 1070 of Lecture Notes in Computer Science, pages 143–154. Springer-Verlag,1996.
-
(1996)
Advances in Cryptology - EUROCRYPT ’96, Volume 1070 of Lecture Notes in Computer Science
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
16
-
-
50749133265
-
On blind signatures and perfect crimes
-
B. von Solms and D. Naccache. On blind signatures and perfect crimes. Computers and Security, 11(6):581–583, 1992.
-
(1992)
Computers and Security
, vol.11
, Issue.6
, pp. 581-583
-
-
Von Solms, B.1
Naccache, D.2
|