메뉴 건너뛰기




Volumn 12, Issue 3, 2004, Pages 247-257

An electronic cash scheme and its management

Author keywords

AP agent; Authorization; Electronic cash; Payment scheme; RBAC; Signature

Indexed keywords

ANONYMITY PROVIDER AGENT; AUTHORIZATION; ELECTRONIC CASH; PAYMENT SCHEME; ROLE BASED ACCESS CONTROL;

EID: 4444351212     PISSN: 1063293X     EISSN: None     Source Type: Journal    
DOI: 10.1177/1063293X04046194     Document Type: Article
Times cited : (11)

References (28)
  • 1
    • 4444341352 scopus 로고
    • May, PayMe: Secure Payment for World Wide Web Services, B.A. (Mod) Project Report, Computer Science Department, Trinity College Dublin, Dublin 2, Ireland
    • Peirce, M. (May 1995). PayMe: Secure Payment for World Wide Web Services, B.A. (Mod) Project Report, Computer Science Department, Trinity College Dublin, Dublin 2, Ireland.
    • (1995)
    • Peirce, M.1
  • 3
    • 84957098723 scopus 로고    scopus 로고
    • Stateless evaluation of Pseudorandom functions: Security beyond the birthday barrier
    • Springer-Verlag
    • Bellare, M., Goldreich, O. and Krawczyk, H. (1999). Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier, In: Advances in Cryptology - Crypto 99, Springer-Verlag, No. 1666.
    • (1999) Advances in Cryptology - Crypto 99 , vol.1666
    • Bellare, M.1    Goldreich, O.2    Krawczyk, H.3
  • 6
    • 0020915882 scopus 로고
    • Blind signature for untraceable payments
    • NY: Plenum Press
    • Chaum, D. (1983). Blind Signature for Untraceable Payments, In: Advances in Cryptology - Crypto 82, NY: Plenum Press, pp. 199-203.
    • (1983) Advances in Cryptology - Crypto 82 , pp. 199-203
    • Chaum, D.1
  • 9
  • 11
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal, T. (1985). A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory, IT-31(4): 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 12
    • 4444378376 scopus 로고
    • (January) Final Report: NIST Small Business Innovative Research (SBIR) Grant: Role Based Access Control: Phase 1, Technical Report, SETA Corp
    • Feinstein, H.L. (January 1995). Final Report: NIST Small Business Innovative Research (SBIR) Grant: Role Based Access Control: Phase 1, Technical Report, SETA Corp.
    • (1995)
    • Feinstein, H.L.1
  • 14
    • 0002422823 scopus 로고    scopus 로고
    • Role-based access control model and reference implementation within a corporate intranet
    • Ferraiolo, D.F., Barkley, J.F. and Kuhn, D.R. (1999). Role-Based Access Control Model and Reference Implementation within a Corporate Intranet, TISSEC, 34-64.
    • (1999) TISSEC , pp. 34-64
    • Ferraiolo, D.F.1    Barkley, J.F.2    Kuhn, D.R.3
  • 16
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • Goldschlag, D., Reed, M. and Syverson, P. (1999). Onion Routing for Anonymous and Private Internet Connections, Communications of the ACM, 24(2): 39-41.
    • (1999) Communications of the ACM , vol.24 , Issue.2 , pp. 39-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 17
    • 4444376175 scopus 로고    scopus 로고
    • MastercardVisa, SET 1.0 - Secure Electronic Transaction Specification
    • MastercardVisa (1997). SET 1.0 - Secure Electronic Transaction Specification, http://www.mastercard.com/set.html
    • (1997)
  • 18
    • 84957610389 scopus 로고
    • An efficient divisible electronic cash scheme
    • Springer-Verlag
    • Okamoto, T. (1995). An Efficient Divisible Electronic Cash Scheme, In: Advances in Cryptology - Crypto'95, Vol. 963, Springer-Verlag, pp. 438-451.
    • (1995) Advances in Cryptology - Crypto'95 , vol.963 , pp. 438-451
    • Okamoto, T.1
  • 20
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A. and Adleman, L.M. (1978). A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, 21(2): 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 24
    • 0010422834 scopus 로고    scopus 로고
    • The URA97 model for role-based administration of user-role assignment
    • Lin, T.Y. and Qian, Xiao (eds), North-Holland
    • Sandhu, R. and Bhamidipati, V. (1997). The URA97 Model for Role-based Administration of User-Role Assignment, In: Lin, T.Y. and Qian, Xiao (eds), Database Security, XI: Status and Prospects, North-Holland.
    • (1997) Database Security, XI: Status and Prospects
    • Sandhu, R.1    Bhamidipati, V.2
  • 25
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Schnorr, C.P. (1991). Efficient Signature Generation by Smart Cards, Journal of Cryptology, 4(3): 161-174.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 27
    • 4444335496 scopus 로고    scopus 로고
    • Fair off-line cash made easy
    • Springer-Verlag
    • Yiannis, T. (1998). Fair Off-line Cash Made Easy, In: Advances by Cryptology - Asiacrypt'98, Vol. 1346, Springer-Verlag, pp. 240-252.
    • (1998) Advances By Cryptology - Asiacrypt'98 , vol.1346 , pp. 240-252
    • Yiannis, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.