-
1
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
Proc. of the Advances in Cryptology-EUROCRYPT'97, Springer, Berlin
-
R. Cramer, R. Gennaro and J. Borrell, A secure and optimally efficient multi-authority election scheme, Proc. of the Advances in Cryptology-EUROCRYPT'97, Lecture Notes in Computer Science, pp. 103-117, Springer, Berlin, 1997.
-
(1997)
Lecture Notes in Computer Science
, pp. 103-117
-
-
Cramer, R.1
Gennaro, R.2
Borrell, J.3
-
2
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Springer-Verlag, pp, Santa Barbara, California, USA
-
R. Cramer and V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, Proc. of the Advanced in Cryptology-Crypto'98, Springer-Verlag, pp. 13-25, Santa Barbara, California, USA, 1998.
-
(1998)
Proc. of the Advanced in Cryptology-Crypto'98
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
3
-
-
1642635005
-
A security payment scheme of mobile e-commerce
-
Beijing, China
-
Y. Dai and L. Zhang, A security payment scheme of mobile e-commerce, Proc. of the ICCT2003, pp. 949-952, Beijing, China, 2003.
-
(2003)
Proc. of the ICCT2003
, pp. 949-952
-
-
Dai, Y.1
Zhang, L.2
-
4
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Y. Ding and P. Horster, Undetectable on-line password guessing attacks, ACM Operating Systems Review, vol. 29, no. 4, pp. 77-86, 1995.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
5
-
-
0141449410
-
Enabling e-commerce through PKI
-
J. Hughes, Enabling e-commerce through PKI, Network Security, pp. 14-16, 2000.
-
(2000)
Network Security
, pp. 14-16
-
-
Hughes, J.1
-
6
-
-
34250221268
-
A credit card-based mobile payment system
-
Shanghai, China
-
K. F. Hwang, I. C. Lin and C. C. Chang, A credit card-based mobile payment system, Proc. of the 2002 International Conference on Information Security, pp. 82-88, Shanghai, China, 2002.
-
(2002)
Proc. of the 2002 International Conference on Information Security
, pp. 82-88
-
-
Hwang, K.F.1
Lin, I.C.2
Chang, C.C.3
-
7
-
-
0036466678
-
Adding timestamps to the secure electronic auction protocol
-
M. S. Hwang, E. J. L. Lu and I. C. Lin, Adding timestamps to the secure electronic auction protocol, Data and Knowledge Engineering, vol. 40, no. 2, pp. 155-162, 2002.
-
(2002)
Data and Knowledge Engineering
, vol.40
, Issue.2
, pp. 155-162
-
-
Hwang, M.S.1
Lu, E.J.L.2
Lin, I.C.3
-
8
-
-
0035149278
-
A simple micro-payment scheme
-
M. S. Hwang, I. C. Lin and L. H. Li, A simple micro-payment scheme, The Journal of Systems and Software, vol. 55, no. 3, pp. 221-229, 2001.
-
(2001)
The Journal of Systems and Software
, vol.55
, Issue.3
, pp. 221-229
-
-
Hwang, M.S.1
Lin, I.C.2
Li, L.H.3
-
9
-
-
0036505541
-
Authentication protocols for mobile network environment value-added services
-
G. K. Horn, M. Martin and C. J. Mitchell, Authentication protocols for mobile network environment value-added services, IEEE Transactions on Vehicular Technology, vol. 51, no. 2, pp. 383-392, 2002.
-
(2002)
IEEE Transactions on Vehicular Technology
, vol.51
, Issue.2
, pp. 383-392
-
-
Horn, G.K.1
Martin, M.2
Mitchell, C.J.3
-
10
-
-
34249303835
-
A new mobile payment scheme for roaming services
-
R. J. Hwang, S. H. Shiau and D. F. Jan, A new mobile payment scheme for roaming services, Electronic Commerce Research and Applications, vol. 6, no. 2, pp. 184-191, 2007.
-
(2007)
Electronic Commerce Research and Applications
, vol.6
, Issue.2
, pp. 184-191
-
-
Hwang, R.J.1
Shiau, S.H.2
Jan, D.F.3
-
12
-
-
0037409816
-
Mobile communications: Evolution and impact on business operations
-
S. Kumar and C. Zahn, Mobile communications: Evolution and impact on business operations, Technovation, vol. 23, pp. 515-520, 2003.
-
(2003)
Technovation
, vol.23
, pp. 515-520
-
-
Kumar, S.1
Zahn, C.2
-
13
-
-
34547328595
-
Anonymous authentication scheme for wireless communications
-
J. S. Lee, C. C. Chang and P. Y. Chang, Anonymous authentication scheme for wireless communications, International Journal of Mobile Communications, vol. 5, no. 5, pp. 590-601, 2007.
-
(2007)
International Journal of Mobile Communications
, vol.5
, Issue.5
, pp. 590-601
-
-
Lee, J.S.1
Chang, C.C.2
Chang, P.Y.3
-
14
-
-
0141569860
-
Lightweight security for mobile commerce transactions
-
K. Y. Lam, S. L. Chung, M. Gu and J. G. Sun, Lightweight security for mobile commerce transactions, Computer Communications, vol. 26, pp. 2052-2060, 2003.
-
(2003)
Computer Communications
, vol.26
, pp. 2052-2060
-
-
Lam, K.Y.1
Chung, S.L.2
Gu, M.3
Sun, J.G.4
-
15
-
-
0033364756
-
Authentication protocol with nonrepudiation services in personal communication systems
-
H. Y. Lin and L. Harn, Authentication protocol with nonrepudiation services in personal communication systems, IEEE Communication Letters, vol. 3, pp. 236-238, 1999.
-
(1999)
IEEE Communication Letters
, vol.3
, pp. 236-238
-
-
Lin, H.Y.1
Harn, L.2
-
16
-
-
33846630288
-
Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce
-
Y. Lee, J. Lee and J.S. Song, Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce, Computer Communications, vol. 30, no. 4, pp. 893-903, 2007.
-
(2007)
Computer Communications
, vol.30
, Issue.4
, pp. 893-903
-
-
Lee, Y.1
Lee, J.2
Song, J.S.3
-
17
-
-
0035701459
-
Three-party encrypted key exchange without server public-keys
-
C. L. Lin, H. M. Sun, M. Steiner and T. Hwang, Three-party encrypted key exchange without server public-keys, IEEE Communications Letters, vol. 5, no. 12, pp. 497-499, 2001.
-
(2001)
IEEE Communications Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.L.1
Sun, H.M.2
Steiner, M.3
Hwang, T.4
-
18
-
-
48249127045
-
Analysis of the robustness of the pressure-based individual identification system based on neural networks
-
L. Mi and F. Takeda, Analysis of the robustness of the pressure-based individual identification system based on neural networks, International Journal of Innovative Computing, Information and Control, vol. 3, no. 1, pp. 97-110, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.1
, pp. 97-110
-
-
Mi, L.1
Takeda, F.2
-
19
-
-
7544234396
-
-
John Wiley & Sons Inc, 2nd Edition, USA
-
P. Sutherland, Applied Cryptography, Protocols, Algorithms, and Source Code in C Bruce Schneier, John Wiley & Sons Inc., 2nd Edition, USA, 1996.
-
(1996)
Applied Cryptography, Protocols, Algorithms, and Source Code in C Bruce Schneier
-
-
Sutherland, P.1
-
20
-
-
0031257939
-
An authentication technique based on distributed security management for global mobility network
-
S. Suzuki and K. Nakada, An authentication technique based on distributed security management for global mobility network, IEEE Journal on Selected Areas in Communications, vol. 15, no. 8, pp. 1608-1617, 1997.
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.8
, pp. 1608-1617
-
-
Suzuki, S.1
Nakada, K.2
-
21
-
-
0035479950
-
Business models and transaction in mobile electronic commerce: Requirements and properties
-
A. Tsalgatidou and E. Pitoura, Business models and transaction in mobile electronic commerce: Requirements and properties, Computer Networks, vol. 37, pp. 221-236, 2001.
-
(2001)
Computer Networks
, vol.37
, pp. 221-236
-
-
Tsalgatidou, A.1
Pitoura, E.2
-
22
-
-
0036696328
-
Electronic payment systems: An analysis and comparison of types
-
H. C. Yu, K. H. Hsi and P. J. Kuo, Electronic payment systems: An analysis and comparison of types, Technology in Society, vol. 24, pp. 331-347, 2002.
-
(2002)
Technology in Society
, vol.24
, pp. 331-347
-
-
Yu, H.C.1
Hsi, K.H.2
Kuo, P.J.3
-
23
-
-
48249149342
-
Security analysis of session initiation protocol
-
Z. Zhang, B. Fang, M. Hu and H. Zhang, Security analysis of session initiation protocol, International Journal of Innovative Computing, Information and Control, vol. 3, no. 2, pp. 457-469, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.2
, pp. 457-469
-
-
Zhang, Z.1
Fang, B.2
Hu, M.3
Zhang, H.4
|