-
2
-
-
3543112038
-
-
CyberSource Corp. (1999), CyberSource Fraud Research, www.cybersource.com/fraud_survey
-
(1999)
CyberSource Fraud Research
-
-
-
3
-
-
84958957924
-
RIPEMD-160: A strengthened version of RIPEMD
-
Gollmann, D. (Ed.), Springer-Verlag, Cambridge
-
Dobbertin, H., Bosselaers, A. and Preneel, B. (1996), "RIPEMD-160: a strengthened version of RIPEMD", in Gollmann, D. (Ed.), Proceedings of the 3rd International Workshop on Fast Software Encryption, Springer-Verlag, Cambridge, pp. 71-82.
-
(1996)
Proceedings of the 3rd International Workshop on Fast Software Encryption
, pp. 71-82
-
-
Dobbertin, H.1
Bosselaers, A.2
Preneel, B.3
-
4
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
ElGamal, T. (1985), "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, Vol. 31, July, pp. 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
5
-
-
0029220609
-
The design and implementation of a secure auction service
-
Meadows, C. and McHugh, J. (Eds), IEEE Computer Society Press, Oakland, CA
-
Franklin, M.K. and Reiter, M.K. (1995), "The design and implementation of a secure auction service", in Meadows, C. and McHugh, J. (Eds), Proceedings of IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Oakland, CA, pp. 2-14.
-
(1995)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Franklin, M.K.1
Reiter, M.K.2
-
6
-
-
0001710760
-
The design and implementation of a secure auction service
-
May
-
Franklin, M.K. and Reiter, M.K. (1996), "The design and implementation of a secure auction service", IEEE Transactions on Software Engineering, Vol. 22, May, pp. 302-12.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, pp. 302-312
-
-
Franklin, M.K.1
Reiter, M.K.2
-
7
-
-
3843062252
-
Security implications of electronic commerce: A survey of consumers and businesses
-
Furnell, S.M. and Karweni, T. (1999), "Security implications of electronic commerce: a survey of consumers and businesses", Internet Research: Electronic Networking Applications and Policy, Vol. 9 No. 5, pp. 372-82.
-
(1999)
Internet Research: Electronic Networking Applications and Policy
, vol.9
, Issue.5
, pp. 372-382
-
-
Furnell, S.M.1
Karweni, T.2
-
8
-
-
0033338140
-
Multi-round anonymous auction protocols
-
April
-
Kikuchi, H., Hakavy, M. and Tygar, D. (1999), "Multi-round anonymous auction protocols", IEICE Transactions on Information & System, Vol. E82-D, April, pp. 769-77.
-
(1999)
IEICE Transactions on Information & System
, vol.E82-D
, pp. 769-777
-
-
Kikuchi, H.1
Hakavy, M.2
Tygar, D.3
-
9
-
-
0031679773
-
Secure electronic sealed-bid auction protocol with public key cryptography
-
January
-
Kudo, M. (1998), "Secure electronic sealed-bid auction protocol with public key cryptography", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E81-A, January, pp. 20-27.
-
(1998)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E81-A
, pp. 20-27
-
-
Kudo, M.1
-
10
-
-
84883898504
-
Privacy preserving auctions and mechanism design
-
ACM Press, Denver, CO
-
Naor, M., Pinkas, B. and Sumner, R. (1999), "Privacy preserving auctions and mechanism design", in Proceedings of the 1st ACM Conference on Electronic Commerce, ACM Press, Denver, CO, pp. 129-39.
-
(1999)
Proceedings of the 1st ACM Conference on Electronic Commerce
, pp. 129-139
-
-
Naor, M.1
Pinkas, B.2
Sumner, R.3
-
12
-
-
0003629991
-
-
NIST FIPS PUB 180-1, US National Institute of Standards and Technology, Gaithersburg, MD
-
National Institute of Standards and Technology (1995), Secure Hash Standard, NIST FIPS PUB 180-1, US National Institute of Standards and Technology, Gaithersburg, MD.
-
(1995)
Secure Hash Standard
-
-
-
13
-
-
85026922284
-
Cryptographic protocols for auctions and bargaining
-
Karhumaki, J., Maurer, H. and Rozenberg, G. (Eds), Springer-Verlag, Berlin
-
Nurmi, H. (1994), "Cryptographic protocols for auctions and bargaining", in Karhumaki, J., Maurer, H. and Rozenberg, G. (Eds), Proceedings of Results and Trends in Theoretical Computer Science, Springer-Verlag, Berlin, pp. 317-24.
-
(1994)
Proceedings of Results and Trends in Theoretical Computer Science
, pp. 317-324
-
-
Nurmi, H.1
-
14
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
February
-
Rivest, R.L., Shamir A. and Adleman, L.M. (1978), "A method for obtaining digital signatures and public key cryptosystems", Communications of the ACM, Vol. 21, February, pp. 120-26.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
15
-
-
35248870807
-
An auction protocol which hides bids of losers
-
Imai, H. and Zheng, Y. (Eds), Springer-Verlag, Melbourne
-
Sako, K. (2000), "An auction protocol which hides bids of losers", in Imai, H. and Zheng, Y. (Eds), Proceedings of the 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, Springer-Verlag, Melbourne, pp. 422-32.
-
(2000)
Proceedings of the 3rd International Workshop on Practice and Theory in Public Key Cryptosystems
, pp. 422-432
-
-
Sako, K.1
-
16
-
-
0018545449
-
How to share a secret
-
November
-
Shamir, A. (1979), "How to share a secret", Communications of the ACM, Vol. 22, November, pp. 612-13.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
|