-
1
-
-
4444341352
-
-
May, PayMe: Secure Payment for World Wide Web Services, B.A. (Mod) Project Report, Computer Science Department, Trinity College Dublin, Dublin 2, Ireland
-
Peirce, M. (May 1995). PayMe: Secure Payment for World Wide Web Services, B.A. (Mod) Project Report, Computer Science Department, Trinity College Dublin, Dublin 2, Ireland.
-
(1995)
-
-
Peirce, M.1
-
2
-
-
0347380552
-
Supporting relationships in access control using role based access control
-
October
-
Barkley, J.F., Beznosov, K. and Uppal, J. (October 1999). Supporting Relationships in Access Control Using Role Based Access Control, The Fourth ACM Workshop on Role-Based Access Control, pp. 55-65.
-
(1999)
The Fourth ACM Workshop on Role-Based Access Control
, pp. 55-65
-
-
Barkley, J.F.1
Beznosov, K.2
Uppal, J.3
-
3
-
-
84957098723
-
Stateless evaluation of Pseudorandom functions: Security beyond the birthday barrier
-
Springer-Verlag
-
Bellare, M., Goldreich, O. and Krawczyk, H. (1999). Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier, In: Advances in Cryptology - Crypto 99, Springer-Verlag, No. 1666.
-
(1999)
Advances in Cryptology - Crypto 99
, vol.1666
-
-
Bellare, M.1
Goldreich, O.2
Krawczyk, H.3
-
4
-
-
0031619016
-
The random oracle methodology
-
Canetti, R., Goldreich, O. and Halevi, S. (1998). The Random Oracle Methodology, In: Proceedings of the 30th ACM STOC '98, pp. 209-218.
-
(1998)
Proceedings of the 30th ACM STOC '98
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
5
-
-
2442664317
-
-
Research Report NU-CCS-96-03, Northeastern University, Boston, Massachussets
-
Chan, A., Frankel, Y. and Tsiounis, Y. (1995). An Efficient Off-line Electronic Cash Scheme as Secure as RSA, Research Report NU-CCS-96-03, Northeastern University, Boston, Massachussets.
-
(1995)
an Efficient Off-line Electronic Cash Scheme As Secure As RSA
-
-
Chan, A.1
Frankel, Y.2
Tsiounis, Y.3
-
6
-
-
0020915882
-
Blind signature for untraceable payments
-
NY: Plenum Press
-
Chaum, D. (1983). Blind Signature for Untraceable Payments, In: Advances in Cryptology - Crypto 82, NY: Plenum Press, pp. 199-203.
-
(1983)
Advances in Cryptology - Crypto 82
, pp. 199-203
-
-
Chaum, D.1
-
8
-
-
0010252194
-
Undeniable signatures
-
Springer-Verlag
-
Chaum, D. and Van Antwerpen, H. (1990). Undeniable Signatures, In: Advances in Cryptology - Crypto 89, Springer-Verlag, No. 435, pp. 212-216.
-
(1990)
Advances in Cryptology - Crypto 89
, vol.435
, pp. 212-216
-
-
Chaum, D.1
Van Antwerpen, H.2
-
9
-
-
84929273746
-
Untraceable electronic cash
-
Springer-Verlag
-
Chaum, D., Fiat, A. and Naor, M. (1990). Untraceable Electronic Cash, In: Advances in Cryptology - Crypto 88, Springer-Verlag, No. 403, pp. 319-327.
-
(1990)
Advances in Cryptology - Crypto 88
, vol.403
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
11
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T. (1985). A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory, IT-31(4): 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
12
-
-
4444378376
-
-
(January) Final Report: NIST Small Business Innovative Research (SBIR) Grant: Role Based Access Control: Phase 1, Technical Report, SETA Corp
-
Feinstein, H.L. (January 1995). Final Report: NIST Small Business Innovative Research (SBIR) Grant: Role Based Access Control: Phase 1, Technical Report, SETA Corp.
-
(1995)
-
-
Feinstein, H.L.1
-
14
-
-
0002422823
-
Role-based access control model and reference implementation within a corporate intranet
-
Ferraiolo, D.F., Barkley, J.F. and Kuhn, D.R. (1999). Role-Based Access Control Model and Reference Implementation within a Corporate Intranet, TISSEC, 34-64.
-
(1999)
TISSEC
, pp. 34-64
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
15
-
-
84944906479
-
Secure and efficient off-line digital money
-
Springer-Verlag
-
Franklin, M. and Yung, M. (1993). Secure and Efficient Off-line Digital Money, In: Proceedings of the Twentieth International Colloquium on Automata, Languages and Programming, Vol. 700, Springer-Verlag, pp. 265-276.
-
(1993)
Proceedings of the Twentieth International Colloquium on Automata, Languages and Programming
, vol.700
, pp. 265-276
-
-
Franklin, M.1
Yung, M.2
-
16
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
Goldschlag, D., Reed, M. and Syverson, P. (1999). Onion Routing for Anonymous and Private Internet Connections, Communications of the ACM, 24(2): 39-41.
-
(1999)
Communications of the ACM
, vol.24
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
17
-
-
4444376175
-
-
MastercardVisa, SET 1.0 - Secure Electronic Transaction Specification
-
MastercardVisa (1997). SET 1.0 - Secure Electronic Transaction Specification, http://www.mastercard.com/set.html
-
(1997)
-
-
-
18
-
-
84957610389
-
An efficient divisible electronic cash scheme
-
Springer-Verlag
-
Okamoto, T. (1995). An Efficient Divisible Electronic Cash Scheme, In: Advances in Cryptology - Crypto'95, Vol. 963, Springer-Verlag, pp. 438-451.
-
(1995)
Advances in Cryptology - Crypto'95
, vol.963
, pp. 438-451
-
-
Okamoto, T.1
-
20
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L., Shamir, A. and Adleman, L.M. (1978). A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, 21(2): 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
24
-
-
0010422834
-
The URA97 model for role-based administration of user-role assignment
-
Lin, T.Y. and Qian, Xiao (eds), North-Holland
-
Sandhu, R. and Bhamidipati, V. (1997). The URA97 Model for Role-based Administration of User-Role Assignment, In: Lin, T.Y. and Qian, Xiao (eds), Database Security, XI: Status and Prospects, North-Holland.
-
(1997)
Database Security, XI: Status and Prospects
-
-
Sandhu, R.1
Bhamidipati, V.2
-
25
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr, C.P. (1991). Efficient Signature Generation by Smart Cards, Journal of Cryptology, 4(3): 161-174.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
26
-
-
84962890350
-
Untraceable off-line electronic cash flow in E-commerce
-
GoldCoast, Australia, IEEE Computer Society
-
Wang, H. and Zhang, Y. Untraceable Off-line Electronic Cash Flow in E-commerce, In: Proceedings of the 24th Australian Computer Science Conference ACSC2001, IEEE Computer Society, GoldCoast, Australia, pp. 191-198.
-
Proceedings of the 24th Australian Computer Science Conference ACSC2001
, pp. 191-198
-
-
Wang, H.1
Zhang, Y.2
-
27
-
-
4444335496
-
Fair off-line cash made easy
-
Springer-Verlag
-
Yiannis, T. (1998). Fair Off-line Cash Made Easy, In: Advances by Cryptology - Asiacrypt'98, Vol. 1346, Springer-Verlag, pp. 240-252.
-
(1998)
Advances By Cryptology - Asiacrypt'98
, vol.1346
, pp. 240-252
-
-
Yiannis, T.1
-
28
-
-
84948446763
-
On the security of ElGamal-based encryption
-
Springer-Verlag, Yokohama, Japan
-
Yiannis, T. and Yung, M. On the Security of ElGamal-based Encryption, International Workshop on Practice and Theory in Public Key Cryptography (PKC '98), Vol. 1346, Springer-Verlag, Yokohama, Japan.
-
International Workshop on Practice and Theory in Public Key Cryptography (PKC '98)
, vol.1346
-
-
Yiannis, T.1
Yung, M.2
|