-
4
-
-
0031650188
-
Asynchronous protocols for optimistic fair exchange
-
Research in Security and Privacy, IEEE Computer Society,Technical Committee on Security and Privacy, IEEE Computer Security Press, May
-
N. Asokan, V. Shoup, and M. Waidner. Asynchronous protocols for optimistic fair exchange. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy, pages 86-99. IEEE Computer Society,Technical Committee on Security and Privacy, IEEE Computer Security Press, May 1998.
-
(1998)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 86-99
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
5
-
-
0033750375
-
Optimistic fair exchange of digital signatures
-
Apr.
-
N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications, 18(4):593-610, Apr. 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 593-610
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
6
-
-
0033281266
-
Efficient verificable encryption (and fair exchange) of digital signatures
-
Singapore, Nov. ACM Press
-
G. Ateniese. Efficient verificable encryption (and fair exchange) of digital signatures. In 6th ACM Conference on Computer and Communications Security, pages 138-146, Singapore, Nov. 1999. ACM Press.
-
(1999)
6th ACM Conference on Computer and Communications Security
, pp. 138-146
-
-
Ateniese, G.1
-
7
-
-
0012749133
-
Multi-party fair exchange with an off-line trusted neutral party
-
Florence, Italy, Sept.
-
F. Bao, R. Deng, K. Q. Nguyen, and V. Vardharajan. Multi-party fair exchange with an off-line trusted neutral party. In DEXA '99 Workshop on Electronic Commerce and Security, Florence, Italy, Sept. 1999.
-
(1999)
DEXA '99 Workshop on Electronic Commerce and Security
-
-
Bao, F.1
Deng, R.2
Nguyen, K.Q.3
Vardharajan, V.4
-
8
-
-
0025246897
-
A fair protocol for signing contracts
-
Jan.
-
M. Ben-Or, O. Goldreich, S. Micali, and R. Rivest. A fair protocol for signing contracts. IEEE Transaction on Information Theory, 36(1):40-46, Jan. 1990.
-
(1990)
IEEE Transaction on Information Theory
, vol.36
, Issue.1
, pp. 40-46
-
-
Ben-Or, M.1
Goldreich, O.2
Micali, S.3
Rivest, R.4
-
9
-
-
84974588386
-
Timed commitments
-
Advances in Cryptology: Proceedings of Crypto 2000, Springer-Verlag
-
D. Boneh and M. Naor. Timed commitments. In Advances in Cryptology: Proceedings of Crypto 2000, volume 1880 of Lecture Notes in Computer Science, pages 236-254. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 236-254
-
-
Boneh, D.1
Naor, M.2
-
10
-
-
84947720195
-
Off-line fair payment protocols using convertible signatures
-
Advances in Cryptology: Proceedings of Asiacrypt'98, Springer-Verlag
-
C. Boyd and E. Foo. Off-line fair payment protocols using convertible signatures. In Advances in Cryptology: Proceedings of Asiacrypt'98, volume 1514 of Lecture Notes in Computer Science, pages 271-285. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1514
, pp. 271-285
-
-
Boyd, C.1
Foo, E.2
-
12
-
-
0022080529
-
A randomized protocol for signing contracts
-
June
-
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, June 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
13
-
-
84958060645
-
Secure group barter: Multi-party fair exchange with semi-trusted neutral parties
-
M. Franklin and G. Tsudik. Secure group barter: Multi-party fair exchange with semi-trusted neutral parties. Lecture Notes in Computer Science, 1465, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1465
-
-
Franklin, M.1
Tsudik, G.2
-
15
-
-
84957060126
-
Abuse-free optimistic contract signing
-
Advances in Cryptology: Proceedings of Crypto'99, Springer-Verlag
-
J. A. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free optimistic contract signing. In Advances in Cryptology: Proceedings of Crypto'99, volume 1666 of Lecture Notes in Computer Science, pages 449-466. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 449-466
-
-
Garay, J.A.1
Jakobsson, M.2
MacKenzie, P.3
-
16
-
-
0033323373
-
Approaching a formal definition of fairness in electronic commerce
-
Lausanne, Switzerland, Oct. IEEE Computer Society Press
-
F. C. Gärtner, H. Pagnia, and H. Vogt. Approaching a formal definition of fairness in electronic commerce. In Proceedings of the International Workshop on Electronic Commerce (WELCOM'99), pages 354-359, Lausanne, Switzerland, Oct. 1999. IEEE Computer Society Press.
-
(1999)
Proceedings of the International Workshop on Electronic Commerce (WELCOM'99)
, pp. 354-359
-
-
Gärtner, F.C.1
Pagnia, H.2
Vogt, H.3
-
17
-
-
84947904138
-
Investigation of non-repudiation protocols
-
ACISP: Information Security and Privacy: Australasian Conference, Springer-Verlag
-
Y. Han. Investigation of non-repudiation protocols. In ACISP: Information Security and Privacy: Australasian Conference, volume 1172 of Lecture Notes in Computer Science, pages 38-47. Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1172
, pp. 38-47
-
-
Han, Y.1
-
18
-
-
84957613612
-
Ripping coins for fair exchange
-
L. C. Guillou and J.-J. Quisquater, editors, Advances in Cryptology: Proceedings of Eurocrypt'95, Springer-Verlag, 21-25 May
-
M. Jakobsson. Ripping coins for fair exchange. In L. C. Guillou and J.-J. Quisquater, editors, Advances in Cryptology: Proceedings of Eurocrypt'95, volume 921 of Lecture Notes in Computer Science, pages 220-230. Springer-Verlag, 21-25 May 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.921
, pp. 220-230
-
-
Jakobsson, M.1
-
19
-
-
84974678532
-
Selective receipt in certified e-mail
-
Advances in Cryptology: Proceedings of Indocrypt 2001, Springer-Verlag, Dec.
-
S. Kremer and O. Markowitch. Selective receipt in certified e-mail. In Advances in Cryptology: Proceedings of Indocrypt 2001, Lecture Notes in Computer Science. Springer-Verlag, Dec. 2001.
-
(2001)
Lecture Notes in Computer Science
-
-
Kremer, S.1
Markowitch, O.2
-
21
-
-
0038441583
-
Optimistic fair-exchange with transparent signature recovery
-
5th International Conference, Financial Cryptography 2001, Springer-Verlag
-
O. Markowitch and S. Saeednia. Optimistic fair-exchange with transparent signature recovery. In 5th International Conference, Financial Cryptography 2001, Lecture Notes in Computer Science. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
-
-
Markowitch, O.1
Saeednia, S.2
-
22
-
-
24944538962
-
Certified E-mail with invisible post offices
-
Available from author; an invited presentation
-
S. Micali. Certified E-mail with invisible post offices. Available from author; an invited presentation at the RSA '97 conference, 1997.
-
(1997)
RSA '97 Conference
-
-
Micali, S.1
-
23
-
-
0031619544
-
Optimal efficiency of optimistic contract signing
-
New York, May ACM
-
B. Pfitzmann, M. Schunter, and M. Waidner. Optimal efficiency of optimistic contract signing. In Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, pages 113-122, New York, May 1998. ACM.
-
(1998)
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing
, pp. 113-122
-
-
Pfitzmann, B.1
Schunter, M.2
Waidner, M.3
-
27
-
-
0038562431
-
How to exchange half a bit
-
D. Chaum, editor, New York, Plenum Press
-
T. Tedrick. How to exchange half a bit. In D. Chaum, editor, Advances in Cryptology: Proceedings of Crypto'83, pages 147-151, New York, 1984. Plenum Press.
-
(1984)
Advances in Cryptology: Proceedings of Crypto'83
, pp. 147-151
-
-
Tedrick, T.1
-
28
-
-
85034645810
-
Fair exchange of secrets
-
G. R. Blakley and D. C. Chaum, editors, Advances in Cryptology: Proceedings of Crypto'84, Springer-Verlag
-
T. Tedrick. Fair exchange of secrets. In G. R. Blakley and D. C. Chaum, editors, Advances in Cryptology: Proceedings of Crypto'84, volume 196 of Lecture Notes in Computer Science, pages 434-438. Springer-Verlag, 1985.
-
(1985)
Lecture Notes in Computer Science
, vol.196
, pp. 434-438
-
-
Tedrick, T.1
-
29
-
-
35248850205
-
Modular fair exchange protocols for electronic commerce
-
Phoenix, Arizona, Dec. IEEE Computer Society Press
-
H. Vogt, H. Pagnia, and F. C. Gärtner. Modular fair exchange protocols for electronic commerce. In Proceedings of the 15th Annual Computer Security Applications Conference, pages 3-11, Phoenix, Arizona, Dec. 1999. IEEE Computer Society Press.
-
(1999)
Proceedings of the 15th Annual Computer Security Applications Conference
, pp. 3-11
-
-
Vogt, H.1
Pagnia, H.2
Gärtner, F.C.3
-
30
-
-
84961312272
-
Evolution of fair non-repudiation with TTP
-
ACISP: Information Security and Privacy: Australasian Conference, Springer-Verlag
-
J. Zhou, R. Deng, and F. Bao. Evolution of fair non-repudiation with TTP. In ACISP: Information Security and Privacy: Australasian Conference, volume 1587 of Lecture Notes in Computer Science, pages 258-269. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1587
, pp. 258-269
-
-
Zhou, J.1
Deng, R.2
Bao, F.3
-
31
-
-
84957806482
-
Some remarks on a fair exchange protocol
-
Proceedings of 2000 International Workshop on Practice and Theory in Public Key Cryptography, Springer-Verlag, Jan.
-
J. Zhou, R. Deng, and F. Bao. Some remarks on a fair exchange protocol. In Proceedings of 2000 International Workshop on Practice and Theory in Public Key Cryptography, volume 1751 of Lecture Notes in Computer Science, pages 46-57. Springer-Verlag, Jan. 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1751
, pp. 46-57
-
-
Zhou, J.1
Deng, R.2
Bao, F.3
-
32
-
-
0029724319
-
A fair non-repudiation protocol
-
Research in Security and Privacy, IEEE Computer Society,Technical Committee on Security and Privacy, IEEE Computer Security Press, May
-
J. Zhou and D. Gollmann. A fair non-repudiation protocol. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy, pages 55-61. IEEE Computer Society,Technical Committee on Security and Privacy, IEEE Computer Security Press, May 1996.
-
(1996)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 55-61
-
-
Zhou, J.1
Gollmann, D.2
|