-
1
-
-
0031650188
-
Asynchronous protocols for optimistic fair exchange
-
Asokan, N., Shoup, V., Waidner, M.: Asynchronous protocols for optimistic fair exchange. In: IEEE Symposium on Security and Privacy, pp. 86-99 (1998)
-
(1998)
IEEE Symposium on Security and Privacy
, pp. 86-99
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
2
-
-
84957616594
-
Optimistic fair exchange of digital signatures
-
Nyberg K. (ed.) EUROCRYPT 1998, Springer, Heidelber
-
Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.1403, pp. 591-606. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
3
-
-
0033750375
-
Optimistic fair exchange of digital signatures
-
Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications 18(4), 593-610 (2000)
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 593-610
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
4
-
-
3142585398
-
Verifiable encryption of digital signatures and applications
-
Ateniese, G.: Verifiable encryption of digital signatures and applications. ACM Transaction on Information and System Security 7(1), 1-20 (2004)
-
(2004)
ACM Transaction on Information and System Security
, vol.7
, Issue.1
, pp. 1-20
-
-
Ateniese, G.1
-
5
-
-
35048873387
-
Identity-based chameleon hash and applications
-
Juels A. (ed.) FC 2004, Springer, Heidelber
-
Ateniese, G., de Medeiros, B.: Identity-based chameleon hash and applications. In: Juels, A. (ed.) FC 2004. LNCS, vol.3110, pp. 164-180. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3110
, pp. 164-180
-
-
Ateniese, G.1
De Medeiros, B.2
-
6
-
-
23944526438
-
On the key-exposure problem in chameleon hashes
-
Blundo, C., Cimato, S. (eds.) SCN 2004, Springer, Heidelberg
-
Ateniese, G., de Medeiros, B.: On the key-exposure problem in chameleon hashes. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.3352, pp. 165-179. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3352
, pp. 165-179
-
-
Ateniese, G.1
De Medeiros, B.2
-
7
-
-
0031682832
-
Efficient and practical fair exchange protocols with off-Line TTP
-
Bao, F., Deng, R., Mao, W.: Efficient and practical fair exchange protocols with off-Line TTP. In: IEEE Symposium on Security and Privacy, pp. 77-85 (1998)
-
(1998)
IEEE Symposium on Security and Privacy
, pp. 77-85
-
-
Bao, F.1
Deng, R.2
Mao, W.3
-
8
-
-
35048828982
-
Chameleon hashing without key exposure
-
Zhang, K., Zheng, Y. (eds.) ISC 2004, Springer, Heidelberg
-
Chen, X., Zhang, F., Kim, K.: Chameleon hashing without key exposure. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.3225, pp. 87-98. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3225
, pp. 87-98
-
-
Chen, X.1
Zhang, F.2
Kim, K.3
-
9
-
-
84957060126
-
Abuse-free optimistic contract signing
-
Wiener M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Garay, J.A., Jakobsson, M., MacKenzie, P.: Abuse-free optimistic contract signing. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.1666, pp. 449-466. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 449-466
-
-
Garay, J.A.1
Jakobsson, M.2
MacKenzie, P.3
-
10
-
-
84944317155
-
Analysis of abuse-free contract signing
-
Frankel Y. (ed.) FC 2000, Springer, Heidelberg
-
Shmatikov, V., Mitchell, J.C.: Analysis of abuse-free contract signing. In: Frankel, Y. (ed.) FC 2000. LNCS, vol.1962, pp. 174-191. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1962
, pp. 174-191
-
-
Shmatikov, V.1
Mitchell, J.C.2
|