Providing Certified Mail Services on the Internet
暂无分享,去创建一个
[1] Liqun Chen,et al. Efficient Fair Exchange with Verifiable Confirmation of Signatures , 1998, ASIACRYPT.
[2] Robert H. Deng,et al. Practical protocols for certified electronic mail , 1996, Journal of Network and Systems Management.
[3] Robert H. Deng,et al. Efficient and practical fair exchange protocols with off-line TTP , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[4] Ning Zhang,et al. Fair certified e-mail delivery , 2004, SAC '04.
[5] Bruce Schneier,et al. A certified e-mail protocol , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[6] Giuseppe Ateniese,et al. Efficient verifiable encryption (and fair exchange) of digital signatures , 1999, CCS '99.
[7] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[8] Zhan Bang,et al. Certified Electronic Mail with Perfect Confidentiality , 1999 .
[9] N. Asokan,et al. Optimistic protocols for fair exchange , 1997, CCS '97.
[10] Rolf Oppliger,et al. Does trusted computing remedy computer security problems? , 2005, IEEE Security & Privacy Magazine.
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Martín Abadi,et al. Certified email with a light on-line trusted third party: design and implementation , 2002, WWW.
[13] Dieter Gollmann,et al. A fair non-repudiation protocol , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[14] Michael K. Reiter,et al. Fair Exchange with a Semi-Trusted Third Party (extended abstract) , 1997, CCS.
[15] Muhammad Torabi Dashti,et al. A Certified Email Protocol Using Key Chains , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[16] Ning Zhang,et al. Achieving Non-Repudiation of Receipt , 1996, Comput. J..
[17] Michael Merritt,et al. Protocols for Data Security , 1983, Computer.
[18] Rolf Oppliger,et al. A certified mail system (CMS) for the Internet , 2004, Comput. Commun..
[19] Tom Coffey,et al. Non-repudiation with mandatory proof of receipt , 1996, CCRV.
[20] Dieter Gollmann,et al. An efficient non-repudiation protocol , 1997, Proceedings 10th Computer Security Foundations Workshop.
[21] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[22] Rolf Oppliger,et al. Certified mail: the next challenge for secure messaging , 2004, CACM.