-
1
-
-
3142585398
-
Verifiable encryption of digital signatures and applications
-
ACM Press
-
G. Ateniese, "Verifiable encryption of digital signatures and applications," ACM Trans. Inf. Syst. Security, vol. 7, no. 1, pp. 1-20, 2004, ACM Press.
-
(2004)
ACM Trans. Inf. Syst. Security
, vol.7
, Issue.1
, pp. 1-20
-
-
Ateniese, G.1
-
2
-
-
0030646696
-
Optimistic protocols for fair exchange
-
ACM Press
-
N. Asokan, M. Schunter, and M. Waidner, "Optimistic protocols for fair exchange," in Proc. ACM Conf. Computer and Communications Security, 1997, pp. 6-17, ACM Press.
-
(1997)
Proc. ACM Conf. Computer and Communications Security
, pp. 6-17
-
-
Asokan, N.1
Schunter, M.2
Waidner, M.3
-
3
-
-
0031650188
-
Asynchronous protocols for optimistic fair exchange
-
IEEE Computer Society Press
-
N. Asokan, V. Shoup, and M. Waidner, "Asynchronous protocols for optimistic fair exchange," in Proc. IEEE Symp. Research in Security and Privacy, 1998, pp. 86-99, IEEE Computer Society Press.
-
(1998)
Proc. IEEE Symp. Research in Security and Privacy
, pp. 86-99
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
4
-
-
84957616594
-
Optimistic fair exchange of digital signatures
-
Advances in Cryptology - EUROCRYPT '98
-
N. Asokan, V. Shoup, and M. Waidner, "Optimistic fair exchange of digital signatures," in Proc. Advances in Cryptology-Eurocrypt 1998 (LNCS 1403), Berlin, Heidelberg, New York, 1998, pp. 591-606, Springer. (Pubitemid 128081515)
-
(1998)
Lecture Notes in Computer Science
, Issue.1403
, pp. 591-606
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
5
-
-
0033750375
-
Optimistic fair exchange of digital signatures
-
Apr
-
N. Asokan, V. Shoup, and M. Waidner, "Optimistic fair exchange of digital signatures," IEEE J. Sel. Areas Commun., vol. 18, no. 4, pp. 593-610, Apr. 2000.
-
(2000)
IEEE J. Sel. Areas Commun
, vol.18
, Issue.4
, pp. 593-610
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
6
-
-
45749113016
-
Improved conditional e-payments
-
Springer-Verlag
-
M. Blanton, "Improved conditional e-payments," in Proc. ACNS 2008, LNCS 5037, 2008, pp. 188-206, Springer-Verlag.
-
(2008)
Proc. ACNS 2008, LNCS
, vol.5037
, pp. 188-206
-
-
Blanton, M.1
-
7
-
-
84976804419
-
How to exchange (secret) keys
-
M. Blum, "How to exchange (secret) keys," ACMTrans. Comput. Syst., vol. 1, no. 2, pp. 175-193, 1983.
-
(1983)
ACMTrans. Comput. Syst
, vol.1
, Issue.2
, pp. 175-193
-
-
Blum, M.1
-
8
-
-
84867248592
-
Untraceable off-line cash in wallet with observers
-
Springer-Verlag
-
S. Brands, "Untraceable off-line cash in wallet with observers," in Proc. Advances in Cryptology-Crypto 1993 (LNCS 773), 1993, pp. 302-318, Springer-Verlag.
-
(1993)
Proc. Advances in Cryptology-Crypto 1993 (LNCS 773)
, pp. 302-318
-
-
Brands, S.1
-
9
-
-
84879548704
-
Optimistic asynchronous multi-party contract signing with reduced number of rounds
-
Automata, Languages and Programming
-
B. Baum-Waidner, "Optimistic asynchronous multi-party contract signing with reduced number of rounds," in Proc. ICALP 2001, LNCS 2076, Berlin, Heidelberg, New York, 2001, pp. 898-911, Springer. (Pubitemid 33300856)
-
(2001)
Lecture Notes in Computer Science
, Issue.2076
, pp. 898-911
-
-
Baum-Waidner, B.1
-
10
-
-
0031682832
-
Efficient and practical fair exchange protocols with off-Line TTP
-
IEEE Computer Society Press
-
F. Bao, R. Deng, and W. Mao, "Efficient and practical fair exchange protocols with off-Line TTP," in Proc. IEEE Symp. Research in Security and Privacy, 1998, pp. 77-85, IEEE Computer Society Press.
-
(1998)
Proc. IEEE Symp. Research in Security and Privacy
, pp. 77-85
-
-
Bao, F.1
Deng, R.2
Mao, W.3
-
11
-
-
84937441148
-
Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
-
Springer-Verlag
-
J. Camenisch and I. Damgård, "Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes," in Proc. Advances in Cryptology-Asiacrypt 2000 (LNCS 1976), 2000, pp. 331-345, Springer-Verlag.
-
(1976)
Proc. Advances in Cryptology-Asiacrypt 2000 (LNCS)
, vol.2000
, pp. 331-345
-
-
Camenisch, J.1
Damgård, I.2
-
12
-
-
35248839965
-
A signature scheme with efficient protocols
-
Springer-Verlag
-
J. Camenisch and A. Lysyanskaya, "A signature scheme with efficient protocols," in Proc. SCN 2002, LNCS 2576, 2003, pp. 268-289, Springer-Verlag.
-
(2003)
Proc. SCN 2002, LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
13
-
-
34548777609
-
Endorsed e-cash
-
DOI 10.1109/SP.2007.15, 4223218, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
J. Camenisch, A. Lysyanskaya, and Meyerovich, "Endorsed e-cash," in Proc. IEEE Symp. Secrity and Privacy, 2007, pp. 101-115. (Pubitemid 47432520)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 101-115
-
-
Camenisch, J.1
Lysyanskaya, A.2
Meyerovich, M.3
-
16
-
-
33750088986
-
Uncheatable reputation for distributed computation markets
-
Financial Cryptography and Data Security - 10th International Conference, FC 2006, Revised Selected Papers
-
B. Carbunar and R. Sion, "Uncheatable reputation for distributed computation markets," in Proc. FC 2006, LNCS 4107, 2006, pp. 96-110, Springer-Verlag. (Pubitemid 44577280)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4107
, pp. 96-110
-
-
Carbunar, B.1
Sion, R.2
-
17
-
-
84860404630
-
Conditional e-payments with transferability
-
Elsevier
-
B. Carbunar, L. Shi, and R. Sion, "Conditional e-payments with transferability," J. Parallel Distrib. Comput., vol. 71, no. 1, pp. 16-26, 2011, Elsevier.
-
(2011)
J. Parallel Distrib. Comput
, vol.71
, Issue.1
, pp. 16-26
-
-
Carbunar, B.1
Shi, L.2
Sion, R.3
-
18
-
-
58449123075
-
Conditioal payments for computing markets
-
Springer-Verlag
-
B. Carbunar and M. Tripunitara, "Conditioal payments for computing markets," in Proc. CANS 2008, LNCS 5339, 2008, pp. 317-331, Springer-Verlag.
-
(2008)
Proc. CANS 2008, LNCS
, vol.5339
, pp. 317-331
-
-
Carbunar, B.1
Tripunitara, M.2
-
20
-
-
77955325308
-
Threeround abuse-free optimistic contract signing with everlasting secrecy
-
Springer-Verlag
-
X.Chen, F. Zhang, H. Tian,Q.Wu, Y.Mu, J.Kim, andK. Kim, "Threeround abuse-free optimistic contract signing with everlasting secrecy," in Proc. FC 2010, LNCS 6052, 2010, pp. 304-311, Springer-Verlag.
-
(2010)
Proc. FC 2010, LNCS
, vol.6052
, pp. 304-311
-
-
Chen, X.1
Zhang, F.2
Wu, Q.3
Tian, H.4
Mu, Y.5
Kim, J.6
Kim, K.7
-
21
-
-
0029362450
-
Practical and provably secure release of a secret and exchange of signatures
-
Springer, Berlin, Heidelberg, New York
-
I. Damgåard, "Practical and provably secure release of a secret and exchange of signatures," J. Cryptology, vol. 8, no. 4, pp. 201-222, 1995, Springer, Berlin, Heidelberg, New York.
-
(1995)
J. Cryptology
, vol.8
, Issue.4
, pp. 201-222
-
-
Damgåard, I.1
-
22
-
-
2442421200
-
Uncheatable grid computing
-
W.Du, J. Jia, M. Mangal, andM. Murugesan, "Uncheatable grid computing," in Proc. 24th Int. Conf. Distributed Computing Systems, 2004, pp. 4-11.
-
(2004)
Proc. 24th Int. Conf. Distributed Computing Systems
, pp. 4-11
-
-
Du, W.1
Jia, J.2
Mangal, M.3
Murugesan, M.4
-
23
-
-
0030246312
-
Practical protocol for certified electronic mail
-
R. H. Deng, L. Gong, A. Lazar, and W. Wang, "Practical protocol for certified electronic mail," J. Netw. Syst. Manage., vol. 4, no. 3, pp. 279-297, 1996.
-
(1996)
J. Netw. Syst. Manage
, vol.4
, Issue.3
, pp. 279-297
-
-
Deng, R.H.1
Gong, L.2
Lazar, A.3
Wang, W.4
-
24
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel, "A randomized protocol for signing contracts," Commun. ACM, vol. 28, no. 6, pp. 637-647, 1985.
-
(1985)
Commun ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
26
-
-
84957060126
-
Abuse-free optimistic contract signing
-
Berlin, Heidelberg, New York Springer
-
J. A. Garay, M. Jakobsson, and P. MacKenzie, "Abuse-free optimistic contract signing," in Proc. Advances in Cryptology-Crypto 1999 (LNCS 1666), Berlin, Heidelberg, New York, 1999, pp. 449-466, Springer.
-
(1999)
Proc. Advances in Cryptology-Crypto 1999 (LNCS 1666)
, pp. 449-466
-
-
Garay, J.A.1
Jakobsson, M.2
MacKenzie, P.3
-
27
-
-
84937555419
-
Uncheatable distributed computations
-
Topics in Cryptology - CT-RSA 2001 The Cryptographers' Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings
-
P. Golle and I. Mironov, "Uncheatable distributed computations," in Proc. CT-RSA 2001, LNCS 2020, 2001, pp. 425-440, Springer-Verlag. (Pubitemid 33255180)
-
(2001)
Lecture notes in Computer Science
, Issue.2020
, pp. 425-440
-
-
Golle, P.1
Mironov, I.2
-
28
-
-
84949235873
-
Secure distributed computing in a commercial environment
-
Springer-Verlag
-
P. Golle and S. G. Stubblebine, "Secure distributed computing in a commercial environment," in Proc. FC 2001, LNCS 2339, 2001, pp. 289-304, Springer-Verlag.
-
(2001)
Proc. FC 2001, LNCS
, vol.2339
, pp. 289-304
-
-
Golle, P.1
Stubblebine, S.G.2
-
29
-
-
58349087313
-
Ambiguous optimistic fair exchange
-
Berlin, Heidelberg, NewYork Springer
-
Q. Huang, G. Yang, D. Wong, and W. Susilo, "Ambiguous optimistic fair exchange," in Proc. Advances in Cryptology-ASIACRYPT 2008 (LNCS5350),Berlin,Heidelberg,NewYork, 2008, pp. 74-89, Springer.
-
(2008)
Proc. Advances in Cryptology-ASIACRYPT 2008 (LNCS5350)
, pp. 74-89
-
-
Huang, Q.1
Yang, G.2
Wong, D.3
Susilo, W.4
-
30
-
-
77956987902
-
Factorization of a 768-bit RSA modulus
-
Berlin, Heidelberg, New York Springer
-
T. Kleinjung, K. Aoki, J. Franke, A. Lenstra, E. Thomé, J. Bos, P. Gaudry, A. Kruppa, P. Montgomery, D. Osvik, H. te Riele, A. Timofeev, and P. Zimmermann, "Factorization of a 768-bit RSA modulus," in Proc. Advances in Cryptology-Crypto 2010 (LNCS 6223), Berlin, Heidelberg, New York, 2010, pp. 333-350, Springer.
-
(2010)
Proc. Advances in Cryptology-Crypto 2010 (LNCS 6223)
, pp. 333-350
-
-
Kleinjung, T.1
Aoki, K.2
Franke, J.3
Lenstra, A.4
Thomé, E.5
Bos, J.6
Gaudry, P.7
Kruppa, A.8
Montgomery, P.9
Osvik, D.10
Te Riele, H.11
Timofeev, A.12
Zimmermann, P.13
-
31
-
-
85174664325
-
Distributed execution with remote audit
-
F.Monrose, P.Wyckoff, and A. Rubin, "Distributed execution with remote audit," in Proc. Network and Distributed System Security Symp., 1999, pp. 103-113.
-
(1999)
Proc. Network and Distributed System Security Symp
, pp. 103-113
-
-
Monrose, F.1
Wyckoff, P.2
Rubin, A.3
-
33
-
-
84919085619
-
An improved algorithm for computing logarithms over and its crytographic significance
-
Jan
-
S. C. Pohlig and M. E. Hellman, "An improved algorithm for computing logarithms over and its crytographic significance," IEEE Trans. Inf. Theory, vol. IT-24, no. 1, pp. 106-110, Jan. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.1
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
34
-
-
0036499242
-
Sabotage-tolerance mechanisms for volunteer computing systems
-
DOI 10.1016/S0167-739X(01)00077-2, PII S0167739X01000772
-
L. F. G. Sarmenta, "Sabotage-tolerance mechanisms for volunteer computing systems," Future Generation Computer Systems: Special Issue on Cluster Computing and the Grid, vol. 18, pp. 561-572, 2002. (Pubitemid 34181832)
-
(2002)
Future Generation Computer Systems
, vol.18
, Issue.4
, pp. 561-572
-
-
Sarmenta, L.F.G.1
-
36
-
-
38549097531
-
Conditional e-cash
-
Financial Cryptography and Data Security - 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Revised Selected Papers
-
L. Shi, B. Carbunar, and R. Sion, "Conditional e-Cash," in Proc. FC 2007, LNCS 4886, 2007, pp. 15-28, Springer-Verlag. (Pubitemid 351153039)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4886
, pp. 15-28
-
-
Shi, L.1
Carbunar, B.2
Sion, R.3
-
37
-
-
0038148401
-
Hardening functions for largescale distributed computations
-
D. Szajda, B. Lawson, and J. Owen, "Hardening functions for largescale distributed computations," in Proc. IEEE Symp. Security and Privacy, 2003, pp. 216-224.
-
(2003)
Proc IEEE Symp. Security and Privacy
, pp. 216-224
-
-
Szajda, D.1
Lawson, B.2
Owen, J.3
-
38
-
-
50149106838
-
Toward an optimal redundancy strategy for distributed computations
-
D. Szajda, B. Lawson, and J. Owen, "Toward an optimal redundancy strategy for distributed computations," in Proc. 2005 IEEE Int. Conf. Cluster Computing, 2005, pp. 1-11.
-
(2005)
Proc. 2005 IEEE Int. Conf. Cluster Computing
, pp. 1-11
-
-
Szajda, D.1
Lawson, B.2
Owen, J.3
|