-
1
-
-
84944115152
-
-
URL: http://www.netscape.com/eng/ssl3/ssl-toc.html
-
-
-
-
2
-
-
84944115153
-
-
URL: http://www.terisa.com/shttp/current.txt
-
-
-
-
3
-
-
0040420112
-
-
VISA INTERNATIONAL, and MASTERCARD INTERNATIONAL, Version 1.0
-
VISA INTERNATIONAL, and MASTERCARD INTERNATIONAL. Secure Electronic Transaction (SET) Specification. Version 1.0, (1997)
-
(1997)
Secure Electronic Transaction (SET) Specification
-
-
-
4
-
-
84949200188
-
An agent-based secure Internet payment system for mobile computing
-
Romao, A., M. M. da. Sliva: “An agent-based secure Internet payment system for mobile computing”, TREC’98, LNCS 1402, (1998) 80-93
-
(1998)
TREC’98, LNCS
, vol.1402
, pp. 80-93
-
-
Romao, A.1
Da Sliva, M.M.2
-
5
-
-
0342647387
-
A secure Agent-based Framework for the Internet Trading in Mobile Computing Environments
-
Yi, X., Siew, C. K., Wang, X. F., Okamoto, E.: “A secure Agent-based Framework for the Internet Trading in Mobile Computing Environments”, in Distributed and Parallel Databases, 8. (2000) 85-117
-
(2000)
In Distributed and Parallel Databases
, vol.8
, pp. 85-117
-
-
Yi, X.1
Siew, C.K.2
Wang, X.F.3
Okamoto, E.4
-
6
-
-
84956857899
-
LITESET: A light-weight secure electronic transaction protocol
-
Springer- Verlag
-
Hanaoka, G., Zheng, Y., Imai, H.: “LITESET: a light-weight secure electronic transaction protocol”, Proc. ACISP'98, Lecture Notes in Computer Science, vol. 1438. Springer- Verlag. (1998) 215-226
-
(1998)
Proc. ACISP'98, Lecture Notes in Computer Science
, vol.1438
, pp. 215-226
-
-
Hanaoka, G.1
Zheng, Y.2
Imai, H.3
-
7
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R. L., Shamir, A., Adleman, L.: “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, 21. (1978) 120-126
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
8
-
-
84958968002
-
Secure Transactions with Mobile Agents in Hostile Environments
-
Kotzanikolaou, P., Burmester, M., Chrissikopoulos, V.: “Secure Transactions with Mobile Agents in Hostile Environments”, ACISP 2000,LNCS 1841. (2000) 289-297
-
(2000)
ACISP 2000,LNCS
, vol.1841
, pp. 289-297
-
-
Kotzanikolaou, P.1
Burmester, M.2
Chrissikopoulos, V.3
-
9
-
-
23044527165
-
Secure mobile agent digital signatures with proxy certificates
-
Romao, A., Sliva da, M. M..: “Secure mobile agent digital signatures with proxy certificates”, E-Commerce Agents, LNAI 2033. (2001) 206-220
-
(2001)
E-Commerce Agents, LNAI
, vol.2033
, pp. 206-220
-
-
Romao, A.1
Sliva Da, M.M.2
-
10
-
-
84944031647
-
-
Cryptography-Theory and Practice, CRC Press
-
Stinson, D. R.: “Secret Sharing Schemes”, Cryptography-Theory and Practice, CRC Press. (1995) 326-331
-
(1995)
Secret Sharing Schemes
, pp. 326-331
-
-
Stinson, D.R.1
-
11
-
-
84944115154
-
-
Handbook of Applied Cryptography, CRC Press
-
Menezes, A., Van Oorschot, P., Vanstone, S.: “Threshold Schemes”, Handbook of Applied Cryptography, CRC Press. (1996)
-
(1996)
Threshold Schemes
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
12
-
-
84947929166
-
Signcryption and Its Applications in Efficient Public Key Solutions
-
Springer-Verlag, LNCS
-
Zheng, Y.: “Signcryption and Its Applications in Efficient Public Key Solutions”, Information Security Workshop (ISW '97), Springer-Verlag, LNCS 1397. (1998) 291-312
-
(1998)
Information Security Workshop (ISW '97)
, vol.1397
, pp. 291-312
-
-
Zheng, Y.1
-
13
-
-
63449122349
-
Digital Signcryption or How to Achieve Cost (Signature& Encryption)<
-
Springer-Verlag
-
Zheng, Y.: “Digital Signcryption or How to Achieve Cost (Signature& Encryption)<
-
(1997)
Advances in Cryptology-CRYPO’97
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
-
14
-
-
0029717329
-
Proxy Signatures for Delegating Signing operation
-
Mambo, M., Usuda, K., Okamoto, E.: “Proxy Signatures for Delegating Signing operation”, Proc. Third ACM Conf. On Computer and Communications Security. (1996) 48-57
-
(1996)
Proc. Third ACM Conf. On Computer and Communications Security
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
15
-
-
0010567510
-
Proxy signatures, Revisited
-
Springer- Verlag
-
Kim, S., Park, S., Won, D.: “Proxy signatures, Revisited”, Proc. Of ICICS’97, International Conference on Information and Communications Security, LNCS 1334, Springer- Verlag. (1997) 223-232
-
(1997)
Proc. Of ICICS’97, International Conference on Information and Communications Security, LNCS
, vol.1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
|