메뉴 건너뛰기




Volumn 60, Issue , 2004, Pages 148-157

Blind sales in electronic commerce

Author keywords

anonymous surfing; CAPTCHA; cryptography; customer buying behaviour; electronic commerce; oblivious transfer; private information retrieval

Indexed keywords

ANONYMOUS SURFING; BUYING BEHAVIOUR; CAPTCHAS; OBLIVIOUS TRANSFER; PRIVATE INFORMATION RETRIEVAL;

EID: 77954502613     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1052220.1052239     Document Type: Conference Paper
Times cited : (4)

References (43)
  • 5
    • 84948973732 scopus 로고    scopus 로고
    • Efficient proofs that a committed number lies in an interval
    • Springer-Verlag
    • F. Boudot, "Efficient proofs that a committed number lies in an interval", Advances in Cryptology: Proceedings of Eurocrypt 00, pages 431-444, Springer-Verlag, 2000.
    • (2000) Advances in Cryptology: Proceedings of Eurocrypt 00 , pp. 431-444
    • Boudot, F.1
  • 7
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • Springer-Verlag
    • C. Cachin, S. Micali and M. Stadler, "Computationally private information retrieval with polylogarithmic communication", Advances in Cryptology: Proceedings of Eurocrypt 99, pages 402-414, Springer-Verlag, 1999.
    • (1999) Advances in Cryptology: Proceedings of Eurocrypt 99 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 9
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms", Communications of the ACM 24(2):84-90, February 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.1
  • 10
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make Big Brother obsolete
    • October
    • D. Chaum, "Security without identification: Transaction systems to make Big Brother obsolete", Communications of the ACM 28(10):1030-1044, October 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 13
    • 35048876464 scopus 로고
    • accessed 8 September 2004
    • R. Clarke, Fundamentals of negotiation. URL: www.anu.edu.au/people/Roger. Clarke/SOS/FundasNeg.html, 1993, accessed 8 September 2004.
    • (1993) Fundamentals of Negotiation
    • Clarke, R.1
  • 14
    • 85030121757 scopus 로고
    • Equivalence between two flavours of oblivious transfers
    • Springer-Verlag
    • C. Crépeau, "Equivalence between two flavours of oblivious transfers", Advances in Cryptology: Proceedings of Crypto 87, pages 350-354, Springer-Verlag, 1988.
    • (1988) Advances in Cryptology: Proceedings of Crypto 87 , pp. 350-354
    • Crépeau, C.1
  • 16
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory 31:469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • ElGamal, T.1
  • 19
    • 57349166235 scopus 로고    scopus 로고
    • accessed 8 September 2004
    • Guardster, Ltd., "Anonymous web surfing", URL: www.guardster.com, accessed 8 September 2004.
    • Anonymous Web Surfing
  • 26
    • 0032621240 scopus 로고    scopus 로고
    • The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms
    • U. M. Maurer and S. Wolf, "The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms", SIAM Journal of Computing 28(5):1689-1721, 1999.
    • (1999) SIAM Journal of Computing , vol.28 , Issue.5 , pp. 1689-1721
    • Maurer, U.M.1    Wolf, S.2
  • 27
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • R. C. Merkle, "Secure communications over insecure channels", Communications of the ACM 21:294-299, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 294-299
    • Merkle, R.C.1
  • 31
    • 0003578535 scopus 로고    scopus 로고
    • Office of the High Commissioner for Human Rights, accessed 8 September 2004
    • Office of the High Commissioner for Human Rights, "Universal Declaration of Human Rights", URL: http://www.unhchr.ch/udhr/lang/eng.htm, accessed 8 September 2004.
    • Universal Declaration of Human Rights
  • 33
    • 0003462641 scopus 로고
    • Technical memo TR-81, Aiken Computation Laboratory, Harvard University
    • M. Rabin, "How to exchange secrets by oblivious transfer", Technical memo TR-81, Aiken Computation Laboratory, Harvard University, 1981.
    • (1981) How to Exchange Secrets by Oblivious Transfer
    • Rabin, M.1
  • 35
    • 0034809926 scopus 로고    scopus 로고
    • Practical server privacy with secure coprocessors
    • September
    • S. W. Smith and D. Safford, "Practical server privacy with secure coprocessors", IBM Systems Journal 40(3):683-695, September 2001.
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 683-695
    • Smith, S.W.1    Safford, D.2
  • 38
    • 85039254031 scopus 로고    scopus 로고
    • Network-Tools.com, accessed 8 September 2004
    • Network-Tools.com, Tools to trace a user, URL: www.Network-Tools.com, accessed 8 September 2004.
    • Tools to Trace a User
  • 41
    • 0001998264 scopus 로고
    • Conjugate coding
    • Manuscript written circa 1970; Unpublished until it appeared
    • S. Wiesner, "Conjugate coding", Manuscript written circa 1970; Unpublished until it appeared in Sigact News 15(1):78-88, 1983.
    • (1983) Sigact News , vol.15 , Issue.1 , pp. 78-88
    • Wiesner, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.