Probabilistic Non-Repudiation without Trusted Third Party
暂无分享,去创建一个
[1] Paul F. Syverson,et al. A different look at secure distributed computation , 1997, Proceedings 10th Computer Security Foundations Workshop.
[2] N. Asokan,et al. Asynchronous protocols for optimistic fair exchange , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[3] Dieter Gollmann,et al. Certified Electronic Mail , 1996, ESORICS.
[4] Robert H. Deng,et al. Efficient and practical fair exchange protocols with off-line TTP , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[5] Nadarajah Asokan,et al. Fairness in electronic commerce , 1998, Research report / RZ / IBM / IBM Research Division / Zürich Research Laboratory.
[6] Bart Preneel,et al. Integrity Primitives for Secure Information Systems: Final RIPE Report of RACE Integrity Primitives Evaluation , 1995 .
[7] Silvio Micali,et al. A fair protocol for signing contracts , 1990, IEEE Trans. Inf. Theory.
[8] Tom Tedrick,et al. How to Exchange Half a Bit , 1983, CRYPTO.
[9] Dieter Gollmann,et al. Evidence and non-repudiation , 1997 .
[10] Oded Goldreich,et al. A Simple Protocol for Signing Contracts , 1983, CRYPTO.
[11] Kazuo Ohta,et al. How to simultaneously exchange secrets by general assumptions , 1994, CCS '94.
[12] N. Asokan,et al. Optimistic protocols for fair exchange , 1997, CCS '97.
[13] Markus Jakobsson,et al. Ripping Coins For a Fair Exchange , 1995, EUROCRYPT.
[14] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[15] Tom Tedrick,et al. Fair Exchange of Secrets , 1984, CRYPTO.
[16] N. Asokan,et al. Optimistic fair exchange of digital signatures , 1998, IEEE Journal on Selected Areas in Communications.
[17] Dieter Gollmann,et al. An efficient non-repudiation protocol , 1997, Proceedings 10th Computer Security Foundations Workshop.
[18] Michael O. Rabin,et al. Transaction Protection by Beacons , 1983, J. Comput. Syst. Sci..
[19] Paul F. Syverson,et al. Weakly secret bit commitment: applications to lotteries and fair exchange , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[20] Dieter Gollmann,et al. Observations on Non-repudiation , 1996, ASIACRYPT.
[21] Yongfei Han. Investigation of non-repudiation protocols , 1996, ACISP.
[22] Robert H. Deng,et al. Practical protocols for certified electronic mail , 1996, Journal of Network and Systems Management.