-
1
-
-
33746901950
-
Constraints on e-commerce in less developed countries: The case of china
-
Chen, S., & Ning, J. (2002). Constraints on e-commerce in less developed countries: The case of china. Electronic Commerce Research, 2(1–2), 31–42. doi:10.1023/A:1013331817147.
-
(2002)
Electronic Commerce Research
, vol.2
, Issue.1-2
, pp. 31-42
-
-
Chen, S.1
Ning, J.2
-
2
-
-
84874241654
-
Cybercrime and cyber-security issues associated with china: some economic and institutional considerations
-
Kshetri, N. (2013). Cybercrime and cyber-security issues associated with china: some economic and institutional considerations. Electronic Commerce Research, 13(1), 41–69. doi:10.1007/s10660-013-9105-4.
-
(2013)
Electronic Commerce Research
, vol.13
, Issue.1
, pp. 41-69
-
-
Kshetri, N.1
-
3
-
-
84925491135
-
Bulapay: A novel web service based third-party payment system for e-commerce
-
Huang, X., Dai, X., & Liang, W. (2014). Bulapay: A novel web service based third-party payment system for e-commerce. Electronic Commerce Research, 14(4), 611–633. doi:10.1007/s10660-014-9172-1.
-
(2014)
Electronic Commerce Research
, vol.14
, Issue.4
, pp. 611-633
-
-
Huang, X.1
Dai, X.2
Liang, W.3
-
4
-
-
85181646826
-
-
Chaum, D. (2013). Blind signatures for untraceable payments. In Advances in cryptology—CRYPTO ’86 Proceedings (pp. 199–203). Berlin: Springer
-
Chaum, D. (2013). Blind signatures for untraceable payments. In Advances in cryptology—CRYPTO ’86 Proceedings (pp. 199–203). Berlin: Springer.
-
-
-
-
5
-
-
84958062532
-
Group blind digital signatures: A scalable solution to electronic cash
-
Goldschlag DM, Stubblebine SG, (eds), Springer, Berlin
-
Lysyanskaya, A., & Ramzan, Z. (1998). Group blind digital signatures: A scalable solution to electronic cash. In D. M. Goldschlag & S. G. Stubblebine (Eds.), Financial cryptography (pp. 184–197). Berlin: Springer.
-
(1998)
Financial cryptography
, pp. 184-197
-
-
Lysyanskaya, A.1
Ramzan, Z.2
-
6
-
-
80053998094
-
Provably-secure electronic cash based on certificateless partially-blind signatures
-
Zhang, L., Zhang, F., Qin, B., & Liu, S. (2011). Provably-secure electronic cash based on certificateless partially-blind signatures. Electronic Commerce Research and Applications, 10(5), 545–552.
-
(2011)
Electronic Commerce Research and Applications
, vol.10
, Issue.5
, pp. 545-552
-
-
Zhang, L.1
Zhang, F.2
Qin, B.3
Liu, S.4
-
7
-
-
79960067346
-
An e-payment system based on quantum group signature
-
Xiaojun, W. (2010). An e-payment system based on quantum group signature. Physica Scripta, 82(6), 65403.
-
(2010)
Physica Scripta
, vol.82
, Issue.6
, pp. 065403
-
-
Xiaojun, W.1
-
8
-
-
79951947591
-
A new untraceable off-line electronic cash system
-
Eslami, Z., & Talebi, M. (2011). A new untraceable off-line electronic cash system. Electronic Commerce Research and Applications, 10(1), 59–66.
-
(2011)
Electronic Commerce Research and Applications
, vol.10
, Issue.1
, pp. 59-66
-
-
Eslami, Z.1
Talebi, M.2
-
9
-
-
84870700738
-
A fair-exchange e-payment protocol for digital products with customer unlinkability
-
Yen, Y.-C., Wu, T.-C., Lo, N.-W., & Tsai, K.-Y. (2012). A fair-exchange e-payment protocol for digital products with customer unlinkability. KSII Transactions on Internet and Information Systems, 6(11), 2956–2979.
-
(2012)
KSII Transactions on Internet and Information Systems
, vol.6
, Issue.11
, pp. 2956-2979
-
-
Yen, Y.-C.1
Wu, T.-C.2
Lo, N.-W.3
Tsai, K.-Y.4
-
10
-
-
84901592456
-
New and efficient conditional e-payment systems with transferability
-
Chen, X., Li, J., Ma, J., Lou, W., & Wong, D. S. (2014). New and efficient conditional e-payment systems with transferability. Future Generation Computer Systems, 37, 252–258.
-
(2014)
Future Generation Computer Systems
, vol.37
, pp. 252-258
-
-
Chen, X.1
Li, J.2
Ma, J.3
Lou, W.4
Wong, D.S.5
-
11
-
-
84890339524
-
An efficient authenticated encryption scheme based on ecc and its application for electronic payment
-
Yang, J.-H., Chang, Y.-F., & Chen, Y.-H. (2013). An efficient authenticated encryption scheme based on ecc and its application for electronic payment. Information Technology And Control, 42(4), 315–324.
-
(2013)
Information Technology And Control
, vol.42
, Issue.4
, pp. 315-324
-
-
Yang, J.-H.1
Chang, Y.-F.2
Chen, Y.-H.3
-
12
-
-
84905565168
-
A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks
-
Farash, M. S., & Attari, M. A. (2014). A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks. The Journal of Supercomputing, 69(1), 395–411.
-
(2014)
The Journal of Supercomputing
, vol.69
, Issue.1
, pp. 395-411
-
-
Farash, M.S.1
Attari, M.A.2
-
13
-
-
84904860928
-
A secure authentication scheme for session initiation protocol by using ecc on the basis of the tang and liu scheme
-
Irshad, A., Sher, M., Faisal, M. S., Ghani, A., Ul Hassan, M., & Ch, S. A. (2014). A secure authentication scheme for session initiation protocol by using ecc on the basis of the tang and liu scheme. Security and Communication Networks, 7(8), 1210–1218.
-
(2014)
Security and Communication Networks
, vol.7
, Issue.8
, pp. 1210-1218
-
-
Irshad, A.1
Sher, M.2
Faisal, M.S.3
Ghani, A.4
Ul Hassan, M.5
Ch, S.A.6
-
14
-
-
84929842561
-
A single round-trip sip authentication scheme for voice over internet protocol using smart card. Multimedia Tools and Applications
-
Irshad, A., Sher, M., Rehman, E., Ch, S. A., Ul Hassan, M., & Ghani, A. (2013). A single round-trip sip authentication scheme for voice over internet protocol using smart card. Multimedia Tools and Applications. doi:10.1007/s11042-013-1807-z.
-
(2013)
doi:10.1007/s11042-013-1807-z
-
-
Irshad, A.1
Sher, M.2
Rehman, E.3
Ch, S.A.4
Ul Hassan, M.5
Ghani, A.6
-
15
-
-
84890424682
-
An enhanced authenticated key agreement for session initiation protocol
-
Farash, M. S., & Attari, M. A. (2013). An enhanced authenticated key agreement for session initiation protocol. Information Technology and Control, 42(4), 333–342.
-
(2013)
Information Technology and Control
, vol.42
, Issue.4
, pp. 333-342
-
-
Farash, M.S.1
Attari, M.A.2
-
16
-
-
84919877584
-
Cryptanalysis and improvement of an efficient mutual authentication rfid scheme based on elliptic curve cryptography
-
Farash, M. S. (2014). Cryptanalysis and improvement of an efficient mutual authentication rfid scheme based on elliptic curve cryptography. The Journal of Supercomputing, 70(1), 987–1001.
-
(2014)
The Journal of Supercomputing
, vol.70
, Issue.1
, pp. 987-1001
-
-
Farash, M.S.1
-
17
-
-
84978805810
-
An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards. International Journal of Communication Systems
-
Farash, M. S., & Attari, M. A. (2014). An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards. International Journal of Communication Systems. doi:10.1002/dac.2848.
-
(2014)
doi:10.1002/dac.2848
-
-
Farash, M.S.1
Attari, M.A.2
-
18
-
-
84953364637
-
Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-Peer Networking and Applications
-
Farash, M. S. (2014). Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-Peer Networking and Applications. doi:10.1007/s12083-014-0315-x.
-
(2014)
doi:10.1007/s12083-014-0315-x
-
-
Farash, M.S.1
-
19
-
-
84920868300
-
Cryptanalysis and improvement of an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks
-
Farash, M. S. (2015). Cryptanalysis and improvement of an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. International Journal of Network Management, 25(1), 31–51.
-
(2015)
International Journal of Network Management
, vol.25
, Issue.1
, pp. 31-51
-
-
Farash, M.S.1
-
20
-
-
84923012240
-
Cryptanalysis and improvement of a robust smart card secured authentication scheme on sip using elliptic curve cryptography. Multimedia Tools and Applications
-
Farash, M. S., Kumari, S., & Bakhtiari, M. (2015). Cryptanalysis and improvement of a robust smart card secured authentication scheme on sip using elliptic curve cryptography. Multimedia Tools and Applications. doi:10.1007/s11042-015-2487-7.
-
(2015)
doi:10.1007/s11042-015-2487-7
-
-
Farash, M.S.1
Kumari, S.2
Bakhtiari, M.3
-
21
-
-
85010364277
-
A provably secure and efficient two-party password-based explicit uthenticated key exchange protocol resistance to password guessing attacks
-
Concurrency and Computation, Practice and Experience
-
Farash, M. S., Islam, S. H., & Mohammad, S. O. (2015). A provably secure and efficient two-party password-based explicit uthenticated key exchange protocol resistance to password guessing attacks. Concurrency and Computation: Practice and Experience. doi:10.1002/cpe.3477.
-
(2015)
-
-
Farash, M.S.1
Islam, S.H.2
Mohammad, S.O.3
-
22
-
-
63449122349
-
-
Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption)〈〈 cost (signature) + cost (encryption). In Advances in Cryptology-CRYPTO’97 (pp. 165–179). Berlin: Springer
-
Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption)〈〈 cost (signature) + cost (encryption). In Advances in Cryptology-CRYPTO’97 (pp. 165–179). Berlin: Springer.
-
-
-
-
23
-
-
84935865949
-
-
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks, Information Sciences
-
He, D., Kumar, N., & Chilamkurti, N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks, Information Sciences. doi:10.1016/j.ins.2015.02.010
-
(2015)
& Chilamkurti, N
-
-
He, D.1
Kumar, N.2
-
24
-
-
84921481484
-
Authentication protocol for an ambient assisted living system
-
He, D., & Zeadally, S. (2015). Authentication protocol for an ambient assisted living system. Communications Magazine, IEEE, 53(1), 71–77.
-
(2015)
Communications Magazine, IEEE
, vol.53
, Issue.1
, pp. 71-77
-
-
He, D.1
Zeadally, S.2
-
25
-
-
84928669844
-
Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems
-
Chaudhry, S., Naqvi, H., Shon, T., Sher, M., & Farash, M. (2015). Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. Journal of Medical Systems, 39(6), 1–11. doi:10.1007/s10916-015-0244-0.
-
(2015)
Journal of Medical Systems
, vol.39
, Issue.6
, pp. 1-11
-
-
Chaudhry, S.1
Naqvi, H.2
Shon, T.3
Sher, M.4
Farash, M.5
-
26
-
-
84925242256
-
-
Abdalla, M., Benhamouda, F., & Pointcheval, D. (2015). Public-key encryption indistinguishable under plaintext-checkable attacks. In Public-Key Cryptography—PKC 2015 (pp. 332–352). Berlin: Springer
-
Abdalla, M., Benhamouda, F., & Pointcheval, D. (2015). Public-key encryption indistinguishable under plaintext-checkable attacks. In Public-Key Cryptography—PKC 2015 (pp. 332–352). Berlin: Springer.
-
-
-
-
27
-
-
84925507784
-
-
An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography, Multimedia Tools and Applications
-
Ch, S. A., Nizamuddin, N., Sher, M., Ghani, A., Naqvi, H., & Irshad, A. (2014). An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multimedia Tools and Applications. doi:10.1007/s11042-014-2283-9.
-
(2014)
& Irshad, A
-
-
Ch, S.A.1
Nizamuddin, N.2
Sher, M.3
Ghani, A.4
Naqvi, H.5
-
28
-
-
84861166810
-
-
Ch, S. A., Nizamuddin, N., & Sher, M. (2012). Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. In Information systems, technology and management (pp. 135–142). Springer
-
Ch, S. A., Nizamuddin, N., & Sher, M. (2012). Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. In Information systems, technology and management (pp. 135–142). Springer.
-
-
-
-
29
-
-
80755159505
-
-
Nizamuddin, N., Ch, S. A., Nasar, W., & Javaid, Q. (2011)Efficient signcryption schemes based on hyperelliptic curve cryptosystem. In 2011 7th IEEE international conference on emerging technologies (ICET) (pp. 1–4)
-
Nizamuddin, N., Ch, S. A., Nasar, W., & Javaid, Q. (2011.)Efficient signcryption schemes based on hyperelliptic curve cryptosystem. In 2011 7th IEEE international conference on emerging technologies (ICET) (pp. 1–4).
-
-
-
-
30
-
-
84857485578
-
Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem
-
Nizamuddin, N., Ch, S. A., & Amin, N. (2011). Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. In IEEE high capacity optical networks and enabling technologies (HONET), 2011 (pp. 244–247).
-
(2011)
In IEEE high capacity optical networks and enabling technologies (HONET)
, vol.2011
, pp. 244-247
-
-
Nizamuddin, N.1
Ch, S.A.2
Amin, N.3
-
31
-
-
63449122349
-
-
Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption) cost (signature) + cost (encryption). In Advances in cryptology-CRYPTO’97 (pp. 165–179). Santa Barbara: Springer
-
Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption) cost (signature) + cost (encryption). In Advances in cryptology-CRYPTO’97 (pp. 165–179). Santa Barbara: Springer.
-
-
-
-
32
-
-
79959762596
-
Secure smart card based password authentication scheme with user anonymity
-
Li, C.-T. (2011). Secure smart card based password authentication scheme with user anonymity. Information Technology and Control, 40(2), 157–162.
-
(2011)
Information Technology and Control
, vol.40
, Issue.2
, pp. 157-162
-
-
Li, C.-T.1
-
33
-
-
80053369762
-
A new efficient key agreement scheme for vsat satellite communications based on elliptic curve cryptosystem
-
Hong, J.-W., Yoon, S.-Y., Park, D.-I., Choi, M.-J., Yoon, E.-J., & Yoo, K.-Y. (2011). A new efficient key agreement scheme for vsat satellite communications based on elliptic curve cryptosystem. Information Technology and Control, 40(3), 252–259.
-
(2011)
Information Technology and Control
, vol.40
, Issue.3
, pp. 252-259
-
-
Hong, J.-W.1
Yoon, S.-Y.2
Park, D.-I.3
Choi, M.-J.4
Yoon, E.-J.5
Yoo, K.-Y.6
-
34
-
-
84953639516
-
A provably secure and efficient authentication scheme for access control in mobile pay-tv systems. Multimedia Tools and Applications
-
Farash, M. S., & Attari, M. A. (2014). A provably secure and efficient authentication scheme for access control in mobile pay-tv systems. Multimedia Tools and Applications. doi:10.1007/s11042-014-2296-4.
-
(2014)
doi:10.1007/s11042-014-2296-4
-
-
Farash, M.S.1
Attari, M.A.2
-
35
-
-
0142002511
-
The elliptic curve digital signature algorithm (ecdsa)
-
Johnson, D., Menezes, A., & Vanstone, S. (2001). The elliptic curve digital signature algorithm (ecdsa). International Journal of Information Security, 1(1), 36–63.
-
(2001)
International Journal of Information Security
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
36
-
-
84884222500
-
Improvement of a three-party password-based key exchange protocol with formal verification
-
Xie, Q., Dong, N., Tan, X., Wong, D. S., & Wang, G. (2013). Improvement of a three-party password-based key exchange protocol with formal verification. Information Technology And Control, 42(3), 231–237.
-
(2013)
Information Technology And Control
, vol.42
, Issue.3
, pp. 231-237
-
-
Xie, Q.1
Dong, N.2
Tan, X.3
Wong, D.S.4
Wang, G.5
-
37
-
-
84955203633
-
-
Xie, Q., Dong, N., Wong, D. S., & Hu, B. Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol. International Journal of Communication Systems
-
Xie, Q., Dong, N., Wong, D. S., & Hu, B. Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol. International Journal of Communication Systems. doi:10.1002/dac.2858
-
-
-
-
38
-
-
84863082688
-
Automatic verification of password-based authentication protocols using smart card
-
Hu, B., Xie, Q., & Li, Y. (2011). Automatic verification of password-based authentication protocols using smart card. In 2011 IEEE international conference on information technology, computer engineering and management sciences (ICM) (Vol. 1, pp. 34–39).
-
(2011)
In 2011 IEEE international conference on information technology, computer engineering and management sciences (ICM)
, vol.1
, pp. 34-39
-
-
Hu, B.1
Xie, Q.2
Li, Y.3
-
39
-
-
84874418956
-
Proving more observational equivalences with proverif
-
Basin D, Mitchell JC, (eds), Springer, Berlin
-
Cheval, V., & Blanchet, B. (2013). Proving more observational equivalences with proverif. In D. Basin & J. C. Mitchell (Eds.), Principles of security and trust (pp. 226–246). Berlin: Springer.
-
(2013)
Principles of security and trust
, pp. 226-246
-
-
Cheval, V.1
Blanchet, B.2
|