-
1
-
-
84964476742
-
iKP - A family of secure electronic payment protocols
-
Bellare, M., Garay, J.A., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Waidner, M.: iKP - a family of secure electronic payment protocols. In: First USENIX Workshop on Electronic Commerce (1995) 89-106 (http://www.usenix.org/publications/library/proceedings/ec95).
-
(1995)
First USENIX Workshop on Electronic Commerce
, pp. 89-106
-
-
Bellare, M.1
Garay, J.A.2
Hauser, R.3
Herzberg, A.4
Krawczyk, H.5
Steiner, M.6
Tsudik, G.7
Waidner, M.8
-
2
-
-
0033731024
-
Design, implementation and deployment of the iKP secure electronic payment system
-
Bellare, M., Garay, J.A., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Herreweghen, E.V., Waidner, M.: Design, implementation and deployment of the iKP secure electronic payment system. IEEE Journal of Selected Areas in Communications 18 (2000) 611-627
-
(2000)
IEEE Journal of Selected Areas in Communications
, vol.18
, pp. 611-627
-
-
Bellare, M.1
Garay, J.A.2
Hauser, R.3
Herzberg, A.4
Krawczyk, H.5
Steiner, M.6
Tsudik, G.7
Herreweghen, E.V.8
Waidner, M.9
-
4
-
-
0037473394
-
Flaw and modification of the iKP electronic payment protocols
-
to appear
-
Ogata, K., Futatsugi, K.: Flaw and modification of the iKP electronic payment protocols. Inf. Process. Lett. (to appear)
-
Inf. Process. Lett.
-
-
Ogata, K.1
Futatsugi, K.2
-
5
-
-
84855621262
-
-
CafeOBJ web page
-
CafeOBJ: CafeOBJ web page. http://www.ldl.jaist.ac.jp/cafeobj/ (2001)
-
(2001)
-
-
-
7
-
-
19044393838
-
Rewriting can verify distributed real-time systems
-
Futatsugi, K., Ogata, K.: Rewriting can verify distributed real-time systems. In: Int'l Symposium on Rewriting, Proof, and Computation. (2001) 60-79
-
(2001)
Int'l Symposium on Rewriting, Proof, and Computation
, pp. 60-79
-
-
Futatsugi, K.1
Ogata, K.2
-
8
-
-
19044393469
-
Rewriting-based verification of authentication protocols
-
WRLA '02. Elsevier Science Publishers
-
Ogata, K., Futatsugi, K.: Rewriting-based verification of authentication protocols. In: WRLA '02. Volume 71 of ENTCS., Elsevier Science Publishers (2002)
-
(2002)
ENTCS
, vol.71
-
-
Ogata, K.1
Futatsugi, K.2
-
11
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inform. Theory IT-29 (1983) 198-208
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
12
-
-
35248872489
-
-
WORKING DRAFT
-
Bellare, M., Garay, J.A., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Waidner, M.: iKP - a family of secure electronic payment protocols (WORKING DRAFT). http://citeseer.nj.nec.com/bellare95ikp.html (1995)
-
(1995)
iKP - A Family of Secure Electronic Payment Protocols
-
-
Bellare, M.1
Garay, J.A.2
Hauser, R.3
Herzberg, A.4
Krawczyk, H.5
Steiner, M.6
Tsudik, G.7
Waidner, M.8
-
13
-
-
33745689203
-
Accountability in electronic commerce protocols
-
Kailar, R.: Accountability in electronic commerce protocols. IEEE Trans. Softw. Eng. 22 (1996) 313-328
-
(1996)
IEEE Trans. Softw. Eng.
, vol.22
, pp. 313-328
-
-
Kailar, R.1
-
14
-
-
35248841951
-
A machine checkable logic of knowledge for specifying security properties of electronic commerce protocols
-
Clarke, E., Jha, S., Marrero, W.: A machine checkable logic of knowledge for specifying security properties of electronic commerce protocols. In: Workshop on Formal Methods and Security Protocols. (1998)
-
(1998)
Workshop on Formal Methods and Security Protocols
-
-
Clarke, E.1
Jha, S.2
Marrero, W.3
-
15
-
-
0001747063
-
Model checking electronic commerce protocols
-
Heintze, N., Tygar, J., Wing, J., Wong, H.C.: Model checking electronic commerce protocols. In: Second USENIX Workshop on Electronic Commerce. (1996) 147-164
-
(1996)
Second USENIX Workshop on Electronic Commerce
, pp. 147-164
-
-
Heintze, N.1
Tygar, J.2
Wing, J.3
Wong, H.C.4
-
16
-
-
0033314445
-
Model checking the Secure Electronic Transaction (SET) protocol
-
Lu, S., Smolka, S.A.: Model checking the Secure Electronic Transaction (SET) protocol. In: MASCOTS '99. (1999) 358-365
-
(1999)
MASCOTS '99
, pp. 358-365
-
-
Lu, S.1
Smolka, S.A.2
-
17
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson, L.C.: The inductive approach to verifying cryptographic protocols. J. Comput. Security 6 (1998) 85-128
-
(1998)
J. Comput. Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
18
-
-
85024252307
-
Inductive analysis of the internet protocol TLS
-
Paulson, L.C.: Inductive analysis of the internet protocol TLS. ACM Trans. Infom. and Sys. Sec. 2 (1999) 332-351
-
(1999)
ACM Trans. Infom. and Sys. Sec.
, vol.2
, pp. 332-351
-
-
Paulson, L.C.1
-
19
-
-
0002984386
-
Formal verification of Cardholder Registration in SET
-
ESORICS 2000. Springer
-
Bella, G., Massacci, F., Paulson, L.C., Tramontane, P.: Formal verification of Cardholder Registration in SET. In: ESORICS 2000. LNCS 1709, Springer (1997) 159-174
-
(1997)
LNCS
, vol.1709
, pp. 159-174
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
Tramontane, P.4
-
21
-
-
0030716978
-
Towards the formal verification of electronic commerce
-
Bolignano, D.: Towards the formal verification of electronic commerce,. In: 10th IEEE CSFW. (1997) 133-146
-
(1997)
10th IEEE CSFW
, pp. 133-146
-
-
Bolignano, D.1
-
22
-
-
84958035071
-
A formal specification of requirements for payment transactions in the SET protocol
-
FC '98. Springer
-
Meadows, C., Syverson, P.: A formal specification of requirements for payment transactions in the SET protocol. In: FC '98. LNCS 1465, Springer (1998) 122-140
-
(1998)
LNCS
, vol.1465
, pp. 122-140
-
-
Meadows, C.1
Syverson, P.2
|