-
1
-
-
8344260802
-
Payment technologies for E-commerce
-
Prof. Weidong Kou, Springer-Verlag, ISBN 3-540-44007-0
-
Amir Herzberg "Payment Technologies for E-Commerce", Micropayments pp.245-280, in Editor Prof. Weidong Kou, Springer-Verlag, ISBN 3-540-44007-0, 2003.
-
(2003)
Micropayments
, pp. 245-280
-
-
Herzberg, A.1
-
4
-
-
84948984606
-
SVP: A flexible micropayment scheme
-
Jacques Stern and Serge Vaudenay "SVP: a Flexible Micropayment Scheme" Financial Crypto '97, 1997: pp.161-171.
-
(1997)
Financial Crypto '97
, pp. 161-171
-
-
Stern, J.1
Vaudenay, S.2
-
9
-
-
85165852835
-
The millicent protocol for inexpensive electronic commerce
-
O'Reilly
-
Steve Glassman, Mark Manasse, Martin Abadi, Paul Gauthier, and Patrick Sobalvarro "The Millicent Protocol for Inexpensive Electronic Commerce" Fourth International World Wide Web Conference Proceedings, O'Reilly, 1995:pp. 603-618
-
(1995)
Fourth International World Wide Web Conference Proceedings
, pp. 603-618
-
-
Glassman, S.1
Manasse, M.2
Abadi, M.3
Gauthier, P.4
Sobalvarro, P.5
-
11
-
-
0010433156
-
Subscrip-an efficient payment mechanism for pay-per view services on the internet
-
Maryland, USA
-
A.Furche and G. Wrightson, "Subscrip-An Efficient Payment Mechanism for Pay-Per View Services on the Internet", 5th IEEE International Conference for Computer Communication and Networks, Maryland, USA, 1996, pp.16-19
-
(1996)
5th IEEE International Conference for Computer Communication and Networks
, pp. 16-19
-
-
Furche, A.1
Wrightson, G.2
-
12
-
-
0001797564
-
PayWord and microMint - Two simple micropayment schemes
-
Ronald L. Rivest and Adi Shamir "PayWord and MicroMint - Two Simple Micropayment Schemes" CryptoBytes, 1996:2(1): pp. 7-11.
-
(1996)
CryptoBytes
, vol.2
, Issue.1
, pp. 7-11
-
-
Rivest, R.L.1
Shamir, A.2
-
14
-
-
0033731024
-
Design, implementation and deployment of the iKP secure electronic payment system
-
April
-
M. Bellare, J.A. Garay, R. Hauser, A. Herzberg, et al "Design, Implementation and Deployment of the iKP Secure Electronic Payment System" In Journal on Selected Areas in Communication, special issue on Network Security, April 2000, 18(4): pp. 611-627.
-
(2000)
Journal on Selected Areas in Communication, Special Issue on Network Security
, vol.18
, Issue.4
, pp. 611-627
-
-
Bellare, M.1
Garay, J.A.2
Hauser, R.3
Herzberg, A.4
-
15
-
-
84964476742
-
IKP - A family of secure electronic payment protocols
-
New York
-
M. Bellare, J. Garay, R. Hauser, A. Herzberg, et al. "iKP - a family of secure electronic payment protocols" In First USENIX Workshop on Electronic Commerce, New York, 1995.
-
(1995)
First USENIX Workshop on Electronic Commerce
-
-
Bellare, M.1
Garay, J.2
Hauser, R.3
Herzberg, A.4
-
17
-
-
0003308762
-
Internet X.509 public key infrastructure certificate and CRL profile
-
January
-
R. Housley, et al "Internet X.509 Public Key Infrastructure Certificate and CRL Profile" IETF RFC2459, January 1999.
-
(1999)
IETF RFC2459
-
-
Housley, R.1
-
18
-
-
30744469428
-
Advances in public-key certificate standards
-
July
-
Ford, W. "Advances in Public-Key Certificate Standards." ACM SIGSAC Review, July 1995
-
(1995)
ACM SIGSAC Review
-
-
Ford, W.1
-
19
-
-
0003237987
-
The kerberos network authentication service (Version 5)
-
September
-
John Kohl and B. Clifford Neuman. "The Kerberos Network Authentication Service (Version 5)". IETF RFC1510. September 1993.
-
(1993)
IETF RFC1510
-
-
Kohl, J.1
Neuman, B.C.2
-
20
-
-
1642330512
-
The evolution of the kerberos authentication service
-
Brazier, F., and Johansen, D., CS: IEEE Computer Society Press
-
J. Kohl, B. Neuman, and T. Ts'o "The Evolution of the Kerberos Authentication Service". In Brazier, F., and Johansen, D. Distributed Open Systems. Los Alamitos, CS: IEEE Computer Society Press, 1994
-
(1994)
Distributed Open Systems. Los Alamitos
-
-
Kohl, J.1
Neuman, B.2
Ts'o, T.3
-
22
-
-
84948976239
-
Using hash functions as a hedge against chosen ciphertext attacks
-
LNCS 1807
-
Victor Shoup "Using hash functions as a hedge against chosen ciphertext attacks" Adv. in Cryptology - Proc. of Eurocrypt 2000, LNCS 1807, pp. 275-288.
-
Adv. in Cryptology - Proc. of Eurocrypt 2000
, pp. 275-288
-
-
Shoup, V.1
-
23
-
-
8344289276
-
Public randomness in cryptography
-
October
-
A. Herzberg, M. Luby, "Public Randomness in Cryptography", proceedings of CRYPTO 1992, ICSI technical report TR-92-068, October, 1992.
-
(1992)
Proceedings of CRYPTO 1992, ICSI Technical Report
, vol.TR-92-068
-
-
Herzberg, A.1
Luby, M.2
-
25
-
-
0345253860
-
Construction of a pseudorandom generator from any one-way function
-
Johan Hastad, Rudich Impagliazzo, Leonid A. Levin, and Mike Luby "Construction of a Pseudorandom Generator from any One-Way Function" SLAM Journal on Computing, 1999:28(4) pp. 1364-1396.
-
(1999)
SLAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
28
-
-
1442335350
-
Internet X.509 public key infrastructure time-stamp protocol (TSP)
-
August
-
C. Adams, P. Cain, D. Pinkas, R. Zuccherato "Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)" IETF RFC3161, August 2001
-
(2001)
IETF RFC3161
-
-
Adams, C.1
Cain, P.2
Pinkas, D.3
Zuccherato, R.4
|