Information Security and Privacy
暂无分享,去创建一个
[1] Stefan Brands,et al. Electronic cash on the Internet , 1995, Proceedings of the Symposium on Network and Distributed System Security.
[2] Benjamin Cox,et al. NetBill Security and Transaction Protocol , 1995, USENIX Workshop on Electronic Commerce.
[3] Niels Ferguson,et al. Extensions of Single-term Coins , 1993, CRYPTO.
[4] Colin Boyd,et al. A Payment Scheme Using Vouchers , 1998, Financial Cryptography.
[5] Mihir Bellare,et al. iKP - A Family of Secure Electronic Payment Protocols , 1995, USENIX Workshop on Electronic Commerce.
[6] Birgit Pfitzmann,et al. How to break fraud-detectable key recovery , 1998, OPSR.
[7] Yiannis Tsiounis,et al. Easy Come - Easy Go Divisible Cash , 1998, EUROCRYPT.
[8] Ueli Maurer,et al. Digital Payment Systems with Passive Anonymity-Revoking Trustees , 1996, ESORICS.
[9] Eric R. Verheul,et al. Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals , 1997, EUROCRYPT.
[10] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[11] Bruce Schneier,et al. Conditional purchase orders , 1997, CCS '97.
[12] Berry Schoenmakers. Basic Security of the ecash Payment System , 1997 .
[13] Stefan A. Brands,et al. Untraceable Off-line Cash in Wallets with Observers (Extended Abstract) , 1993, CRYPTO.
[14] Tatsuaki Okamoto,et al. Single-Term Divisible Electronic Coins , 1994, EUROCRYPT.
[15] Martín Abadi,et al. Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..
[16] Matthew K. Franklin,et al. The Design and Implementation of a Secure Auction Service , 1996, IEEE Trans. Software Eng..