Achieving Fairness in Private Contract Negotiation
暂无分享,去创建一个
[1] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[2] Tatsuaki Okamoto,et al. EPOC: Efficient Probabilistic Public-Key Encryption (Submission to P1363a) , 1998 .
[3] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[4] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[5] Russell Impagliazzo,et al. Limits on the provable consequences of one-way permutations , 1988, STOC '89.
[6] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[7] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[8] Michael Ströbel,et al. Intention and Agreement Spaces-A Formalism , 2000 .
[9] Mikhail J. Atallah,et al. Privacy preserving route planning , 2004, WPES '04.
[10] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[11] Rafail Ostrovsky,et al. Round-Optimal Secure Two-Party Computation , 2004, CRYPTO.
[12] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[13] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[14] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[15] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[16] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[17] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[18] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[19] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[20] Guido Governatori,et al. Defeasible Logic for Automated Negotiation * , 2022 .
[21] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[22] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[23] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[24] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[25] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[26] Yehuda Lindell,et al. Universally composable two-party and multi-party secure computation , 2002, STOC '02.
[27] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[28] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[29] Shafi Goldwasser,et al. Multi party computations: past and present , 1997, PODC '97.
[30] Jianhua Shao,et al. Preserving privacy when preference searching in e-commerce , 2003, WPES '03.
[31] Benjamin N. Grosof,et al. A declarative approach to business rules in contracts: courteous logic programs in XML , 2015, EC '99.
[32] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[33] Oded Goldreich,et al. Cryptography and cryptographic protocols , 2003, Distributed Computing.
[34] Matthew Franklin,et al. Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.