Design of Pairing-Based Proxy Signcryption System Model for Online Proxy Auctions
暂无分享,去创建一个
[1] Hyungkyu Yang,et al. Self-certified identity information using the minimum knowledge , 1996, Proceedings of Digital Processing Applications (TENCON '96).
[2] Chien-Lung Hsu,et al. Efficient proxy signature schemes using self-certified public keys , 2004, Appl. Math. Comput..
[3] Siu-Ming Yiu,et al. Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.
[4] Shahrokh Saeednia. Identity-Based and Self-Certified Key-Exchange Protocols , 1997, ACISP.
[5] Katia P. Sycara,et al. Mechanism design for coalition formation and cost sharing in group-buying markets , 2004, Electron. Commer. Res. Appl..
[6] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[7] Gwoboa Horng,et al. A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEME , 2011 .
[8] Zuhua Shao,et al. Self-certified signature scheme from pairings , 2007, J. Syst. Softw..
[9] Patrick Horster,et al. Self-certified keys — Concepts and Applications , 1997 .
[10] Robert J. Kauffman,et al. Economics and Electronic Commerce: Survey and Directions for Research , 2001, Int. J. Electron. Commer..
[11] Marc Girault,et al. Self-Certified Public Keys , 1991, EUROCRYPT.
[12] Alok Gupta,et al. Analysis and Design of Business - to - Consumer Online Auctions , 2003, Manag. Sci..
[13] Jussipekka Leiwo,et al. An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption , 1998 .
[14] Tzu-Chun Lin,et al. GENERALIZATION OF PROXY SIGNATURE BASED ON FACTORIZATION , 2011 .
[15] Han-Yu Lin,et al. Efficient proxy signcryption scheme with provable CCA and CMA security , 2010, Comput. Math. Appl..
[16] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[17] Rong-Hwa Huang,et al. Key success factors for online auctions: Analysis of auctions of fashion clothing , 2011, Expert Syst. Appl..
[18] Zhong Chen,et al. Bidder-anonymous English auction protocol based on revocable ring signature , 2012, Expert Syst. Appl..
[19] Kefei Chen,et al. Identity based proxy-signcryption scheme from pairings , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.
[20] Kwai-Sang Chin,et al. Design of optimal double auction mechanism with multi-objectives , 2011, Expert Syst. Appl..
[21] Jean-Jacques Quisquater,et al. A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[22] Woei-Jiunn Tsaur,et al. Several security schemes constructed using ECC-based self-certified public key cryptosystems , 2005, Appl. Math. Comput..
[23] Liqun Chen,et al. Improved Identity-Based Signcryption , 2005, Public Key Cryptography.
[24] Zhenfu Cao,et al. Two Proxy Signcryption Schemes from Bilinear Pairings , 2005, CANS.
[25] Zuhua Shao,et al. Security of self-certified signatures , 2009, Inf. Process. Lett..
[26] Meng Wang,et al. Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability , 2005, ICCNMC.
[27] Abraham Seidmann,et al. Managing Online Auctions: Current Business and Research Issues , 2003, Manag. Sci..