-
1
-
-
84867467187
-
-
a Ed). 2005
-
a Ed). 2005.
-
-
-
-
2
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
January
-
M. Abadi, R. Needham, Prudent engineering practice for cryptographic protocols, IEEE Transactions on Software Engineering, 22(1):6-15, January 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
3
-
-
33645689192
-
Certified email with a light on-line trusted third party: Design and implementation
-
The Eleventh International World Wide Web Conference, Honoloulu, Hawaii, USA
-
M. Abadi, N. Glew, B. Horne, B. Pinkas, Certified email with a light on-line trusted third party: design and implementation, The Eleventh International World Wide Web Conference, Honoloulu, Hawaii, USA, 2002.
-
(2002)
-
-
Abadi, M.1
Glew, N.2
Horne, B.3
Pinkas, B.4
-
4
-
-
3543145461
-
An Extended Multi-Agent Negotiation Protocol
-
Springer Science+Business Media B.V., Formerly Kluwer Academic Publishers B.V
-
S. Aknine, S. Pinson, M. F. Shakun, An Extended Multi-Agent Negotiation Protocol, Journal of Autonomous Agents and Multi-Agent Systems, 8, 5-45, Springer Science+Business Media B.V., Formerly Kluwer Academic Publishers B.V. 2004.
-
(2004)
Journal of Autonomous Agents and Multi-Agent Systems
, vol.8
, pp. 5-45
-
-
Aknine, S.1
Pinson, S.2
Shakun, M.F.3
-
5
-
-
30044452647
-
Dynamic and Secure B2B E-contract Update Management
-
Proceedings of the 6th ACM Conference on Electronic Commerce (EC'05), Vancouver, Canada
-
S. Angelov, S. Till, P. Grefen, Dynamic and Secure B2B E-contract Update Management, Proceedings of the 6th ACM Conference on Electronic Commerce (EC'05), Vancouver, Canada. 2005.
-
(2005)
-
-
Angelov, S.1
Till, S.2
Grefen, P.3
-
6
-
-
0031650188
-
Asynchronous protocols for optimistic fair exchange
-
Proceedings of the IEEE Symposium on Research in Security and Privacy
-
N. Asokan, V. Shoup, M. Waidner, Asynchronous protocols for optimistic fair exchange, Proceedings of the IEEE Symposium on Research in Security and Privacy, 1998.
-
(1998)
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
7
-
-
35248876774
-
SAT-based Model-Checking of Security Protocols using Planning Graph Analysis
-
In Proc. of the 12th International Symposium of Formal Methods Europe (FME), Springer-Verlag
-
A. Armando, L. Compagna, P. Ganty, SAT-based Model-Checking of Security Protocols using Planning Graph Analysis, In Proc. of the 12th International Symposium of Formal Methods Europe (FME), LNCS 2805, Springer-Verlag 2003.
-
(2003)
LNCS
, vol.2805
-
-
Armando, A.1
Compagna, L.2
Ganty, P.3
-
8
-
-
26444497860
-
The Avispa Tool for automated validation of internet security protocols and applications
-
Proc. Of Computer Aided Verification, Springer Verlag
-
A. Armando, A. et al., The Avispa Tool for automated validation of internet security protocols and applications, Proc. Of Computer Aided Verification, Lecture Notes in Computer Science (LNCS) 3576. Springer Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science (LNCS)
, vol.3576
-
-
Armando, A.1
-
10
-
-
0142188052
-
An On-The-Fly Model-Checker for Security Protocol Analysis
-
In E. Snekkenes and D. Gollmann, editors, Proc. Of ESORICS'03, Springer-Verlag
-
D. Basin, S. Mödersheim, L. Viganò, An On-The-Fly Model-Checker for Security Protocol Analysis, In E. Snekkenes and D. Gollmann, editors, Proc. Of ESORICS'03, LNCS 2808, Springer-Verlag 2003, pp. 253-270.
-
(2003)
LNCS
, vol.2808
, pp. 253-270
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
11
-
-
67449100042
-
Improvements on the Genet and Klay Technique to Automatically Verify Security Protocols
-
Proc. of AVIS'04
-
Y. Boichut, et al., Improvements on the Genet and Klay Technique to Automatically Verify Security Protocols, Proc. of AVIS'04, ENTCS.
-
ENTCS
-
-
Boichut, Y.1
-
12
-
-
33646931594
-
Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS)
-
S. Blake-Wilson, P. Lamber, Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS), Request for Comments 3278, 2002.
-
(2002)
Request for Comments
, vol.3278
-
-
Blake-Wilson, S.1
Lamber, P.2
-
13
-
-
80051982639
-
NetBill security and transaction protocol
-
In Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce
-
B. Cox, J. D. Tygar, M. Sirbu. NetBill security and transaction protocol. In Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1, 77-88. 1995.
-
(1995)
, vol.1
, pp. 77-88
-
-
Cox, B.1
Tygar, J.D.2
Sirbu, M.3
-
14
-
-
71049157039
-
Secure Negotiation in Virtual Organizations
-
In Proceedings of the 10th IEEE on International Enterprise Distributed Object Computing Conference Workshops. IEEE Computer Society
-
S. Darko-Ampem, M. Katsoufi, P. Giambiagi, Secure Negotiation in Virtual Organizations. In Proceedings of the 10th IEEE on International Enterprise Distributed Object Computing Conference Workshops. IEEE Computer Society. 2006.
-
(2006)
-
-
Darko-Ampem, S.1
Katsoufi, M.2
Giambiagi, P.3
-
15
-
-
48649086330
-
Broker-Based Secure Negotiation of Intellectual Property Rights
-
In Proceedings of the 4th International Conference on Information Security, Springer-Verlag
-
J. Delgado, I. Gallego, X. Perramon. Broker-Based Secure Negotiation of Intellectual Property Rights. In Proceedings of the 4th International Conference on Information Security, pp. 486-496. Springer-Verlag. 2001.
-
(2001)
, pp. 486-496
-
-
Delgado, J.1
Gallego, I.2
Perramon, X.3
-
16
-
-
0003286492
-
The TLS Protocol Version 1.0
-
January
-
T. Dierks, C. Allen, The TLS Protocol Version 1.0. RFC 2246. January 1999.
-
(1999)
RFC
, vol.2246
-
-
Dierks, T.1
Allen, C.2
-
17
-
-
4444331854
-
Randomness Recommendations for Security
-
December
-
D. Eastlake, S. Crocker, J. Schiller, "Randomness Recommendations for Security", RFC 1750, December 1994.
-
(1994)
RFC
, vol.1750
-
-
Eastlake, D.1
Crocker, S.2
Schiller, J.3
-
18
-
-
84957060126
-
Abuse-free optimistic contract signing
-
In proceedings of CRYPTO'99
-
J. Garay, M. Jakobsson, P. MacKenzie, Abuse-free optimistic contract signing, In proceedings of CRYPTO'99, Lecture Notes in Computer Science 1666, pp. 449-466. 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 449-466
-
-
Garay, J.1
Jakobsson, M.2
MacKenzie, P.3
-
20
-
-
27644482822
-
On the security of fair non-repudiation protocols
-
S. Gürgens, C. Rudolph, H. Vogt, On the security of fair non-repudiation protocols, International Journal of Information Security, volume 4, issue 4, 253-262. 2005.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.4
, pp. 253-262
-
-
Gürgens, S.1
Rudolph, C.2
Vogt, H.3
-
21
-
-
67449100825
-
-
Autonomous Agents 2000 Workshop: Agents in Industry, Barcelona, Spain
-
M. Jalali, G. Hachez, C. Vasserot, FILIGRANE: a security framework for trading of mobile code in Internet, Autonomous Agents 2000 Workshop: Agents in Industry, Barcelona, Spain, 2000.
-
(2000)
FILIGRANE: a Security Framework for Trading of Mobile Code in Internet
-
-
Jalali, M.1
Hachez, G.2
Vasserot, C.3
-
22
-
-
84900847325
-
Improving fairness and privacy of Zhou-Gollmann's fair non-repudiation protocol
-
Proceedings of 1999 ICPP Workshops on Security (IWSEC), IEEE Computer Society, Sep. 21-22
-
K. Kim, S. Park, J. Baek, Improving fairness and privacy of Zhou-Gollmann's fair non-repudiation protocol, Proceedings of 1999 ICPP Workshops on Security (IWSEC), IEEE Computer Society, Sep. 21-22, pp.140-145. 1999.
-
(1999)
, pp. 140-145
-
-
Kim, K.1
Park, S.2
Baek, J.3
-
23
-
-
0036836682
-
An intensive survey of fair non-repudiation protocols
-
Elsevier, Nov
-
S. Kremer, O. Markowitch, J. Zhou, An intensive survey of fair non-repudiation protocols, Computer Communications, 25(17): 1606-1621. Elsevier, Nov. 2002.
-
(2002)
Computer Communications
, vol.25
, Issue.17
, pp. 1606-1621
-
-
Kremer, S.1
Markowitch, O.2
Zhou, J.3
-
24
-
-
84867446755
-
-
Tony Weir trans., Hein Kötz & Axel Flessner eds.
-
H. Kötz, European Contract Law: Formation, Validity, and Content of Contracts; Contract and Third Parties, (Tony Weir trans., Hein Kötz & Axel Flessner eds., 1997.
-
(1997)
European Contract Law: Formation, Validity, and Content of Contracts; Contract and Third Parties
-
-
Kötz, H.1
-
25
-
-
77952325597
-
Selecting theories and nonce generation for recursive protocols
-
In Proceedings of the 2007 ACM workshop on Formal methods in security engineering, Fairfax, Virginia, USA
-
K. O. Kürtz, R. Küsters, T. Wilke. Selecting theories and nonce generation for recursive protocols. In Proceedings of the 2007 ACM workshop on Formal methods in security engineering, pp. 61-70. Fairfax, Virginia, USA. 2007.
-
(2007)
, pp. 61-70
-
-
Kürtz, K.O.1
Küsters, R.2
Wilke, T.3
-
26
-
-
0038570797
-
An Agent-Based Negotiation Model Supporting Transactions in Electronic Commerce
-
Proceedings of the 11th International Workshop on Database and Expert Systems Applications, IEEE Computer Society
-
B. Limthanmaphon, Y. Zhang, Z. Zhang. An Agent-Based Negotiation Model Supporting Transactions in Electronic Commerce. Proceedings of the 11th International Workshop on Database and Expert Systems Applications, IEEE Computer Society, 2000.
-
(2000)
-
-
Limthanmaphon, B.1
Zhang, Y.2
Zhang, Z.3
-
28
-
-
35248855514
-
On fairness in exchange protocols
-
In Pil Joong Lee and Chae Hoon Lim, editors, 5th International Conference on Information Security and Cryptology (ICISC 2002), Seoul, Korea, November
-
O. Markowitch, D. Gollmann, D. S. Kremer, On fairness in exchange protocols, In Pil Joong Lee and Chae Hoon Lim, editors, 5th International Conference on Information Security and Cryptology (ICISC 2002), volume 2587 of Lecture Notes in Computer Science, pages 451-464, Seoul, Korea, November 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2587
, pp. 451-464
-
-
Markowitch, O.1
Gollmann, D.2
Kremer, D.S.3
-
29
-
-
0003508560
-
Specification for the Advanced Encryption Standard (AES)
-
National Institute of Standards and Technology, FIPS 197. November 26
-
National Institute of Standards and Technology, Specification for the Advanced Encryption Standard (AES), FIPS 197. November 26, 2001.
-
(2001)
-
-
-
31
-
-
1142305223
-
Constructing fair exchange protocols for e-commerce via distributed computation of RSA signatures
-
ACM Press
-
J. J. Park, E. Chong, H. Siegel, I. Ray, Constructing fair exchange protocols for e-commerce via distributed computation of RSA signatures, In Proc. of 22th Annual ACM Symp. on Principles of Distributed Computing (PODC'03), pp. 172-181. ACM Press, 2003.
-
(2003)
Proc. of 22th Annual ACM Symp. on Principles of Distributed Computing (PODC'03)
, pp. 172-181
-
-
Park, J.J.1
Chong, E.2
Siegel, H.3
Ray, I.4
-
35
-
-
84947295106
-
SPEED Protocol: SmartCard-based Payment with Encrypted Electronic Delivery
-
Málaga, Spain
-
A. Ruiz, G. Martínez, O. Cánovas, A. F. Gómez-Skarmeta, SPEED Protocol: SmartCard-based Payment with Encrypted Electronic Delivery, Proc. Information Security Conference, Málaga, Spain, 2001, 446-461
-
(2001)
Proc. Information Security Conference
, pp. 446-461
-
-
Ruiz, A.1
Martínez, G.2
Cánovas, O.3
Gómez-Skarmeta, A.F.4
-
36
-
-
2642577477
-
-
Proceedings International Conference on Communication, Network, and Information Security, New York USA
-
A. Ruiz, L. Baño, C.I. Marín, O. Cánovas, A. F. Gómez, A Secure Infrastructure for Negotiation and Purchase of Intellectual Property Rights (SECURingIPR). Proceedings International Conference on Communication, Network, and Information Security, New York USA, 2003.
-
(2003)
A Secure Infrastructure for Negotiation and Purchase of Intellectual Property Rights (SECURingIPR)
-
-
Ruiz, A.1
Baño, L.2
Marín, C.I.3
Cánovas, O.4
Gómez, A.F.5
-
37
-
-
37149009790
-
Automatically Analysing Non-repudiation with Authentication
-
Proceedings of 3rd Taiwanese-French Conference on Information Technology (TFIT), Nancy, France
-
J. Santiago and L. Vigneron, Automatically Analysing Non-repudiation with Authentication, Proceedings of 3rd Taiwanese-French Conference on Information Technology (TFIT), 541--554, Nancy, France, 2006.
-
(2006)
, pp. 541-554
-
-
Santiago, J.1
Vigneron, L.2
-
39
-
-
0033690444
-
-
IEEE Network, May/June
-
T. Schroeder, S. Goddard, B. Ramamurthy, Scalable Web Server Clustering Technologies, IEEE Network, May/June 2000, pp. 38-45.
-
(2000)
Scalable Web Server Clustering Technologies
, pp. 38-45
-
-
Schroeder, T.1
Goddard, S.2
Ramamurthy, B.3
-
40
-
-
1642515444
-
DocLog: An Electronic Contract Representation Language
-
In Proceedings of the 11th International Workshop on Database and Expert Systems Applications. IEEE Computer Society
-
Y. Tan, W. Thoen. DocLog: An Electronic Contract Representation Language. In Proceedings of the 11th International Workshop on Database and Expert Systems Applications. IEEE Computer Society. 2000.
-
(2000)
-
-
Tan, Y.1
Thoen, W.2
-
42
-
-
33750930529
-
An abuse-free fair contract signing protocol based on the RSA signature
-
Proceedings of the 14th international conference on World Wide Web, Japan
-
G. Wang, An abuse-free fair contract signing protocol based on the RSA signature. Proceedings of the 14th international conference on World Wide Web, 412 - 421, Japan. 2005.
-
(2005)
, pp. 412-421
-
-
Wang, G.1
-
43
-
-
67449102443
-
-
Word Wide Web Consortium (W3C). XML-Signature Syntax and Processing. W3C Recommendation. 12 February 2002
-
Word Wide Web Consortium (W3C). XML-Signature Syntax and Processing. W3C Recommendation. 12 February 2002.
-
-
-
-
44
-
-
84880146881
-
A Non-Repudiation Message Transfer Protocol for E- commerce
-
IEEE International Conference on E-Commerce Technology (CEC'03)
-
S. Yang, S.Y.W. Su, H. Lam, A Non-Repudiation Message Transfer Protocol for E- commerce. IEEE International Conference on E-Commerce Technology (CEC'03), 2003.
-
(2003)
-
-
Yang, S.1
Su, S.Y.W.2
Lam, H.3
-
45
-
-
33747804675
-
A non-repudiation message transfer protocol for collaborative e-commerce
-
S. Yang, S.Y.W. Su, H. Lam, A non-repudiation message transfer protocol for collaborative e-commerce, International Journal of Business Process Integration and Management 2005 - Vol. 1, No.1. pp. 34 - 42.
-
(2005)
International Journal of Business Process Integration and Management
, vol.1
, Issue.1
, pp. 34-42
-
-
Yang, S.1
Su, S.Y.W.2
Lam, H.3
-
46
-
-
0034239310
-
Application Layer Anycasting: A Server Selection Architecture and Use in a Replicated Web Service
-
August
-
E. Zegura, M. Ammar, Z. Fei, S. Bhattacharjee, Application Layer Anycasting: A Server Selection Architecture and Use in a Replicated Web Service, IEEE/ACM Transactions on Networking, Vol. 8, No. 4, August 2000, pp. 455-467.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.4
, pp. 455-467
-
-
Zegura, E.1
Ammar, M.2
Fei, Z.3
Bhattacharjee, S.4
-
47
-
-
0029724319
-
A Fair Non-repudiation Protocol
-
proceedings of 1996 IEEE Symposium on Security and Privacy, Oakland, CA, May
-
J. Zhou, D. Gollmann, A Fair Non-repudiation Protocol, proceedings of 1996 IEEE Symposium on Security and Privacy, pp. 55-61, Oakland, CA, May 1996.
-
(1996)
, pp. 55-61
-
-
Zhou, J.1
Gollmann, D.2
|