A consumer scalable anonymity payment scheme with role based access control
暂无分享,去创建一个
[1] Yiannis Tsiounis,et al. Fair Off-Line e-cash Made Easy , 1998, ASIACRYPT.
[2] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[3] Tatsuaki Okamoto,et al. An Efficient Divisible Electronic Cash Scheme , 1995, CRYPTO.
[4] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] Elena Gramatová,et al. The MD5 Message-Digest Algorithm in the XILINX FPGA , 1994, FPL.
[7] Hugo Krawczyk,et al. Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier , 1999, CRYPTO.
[8] Hua Wang,et al. Untraceable off-line electronic cash flow in e-commerce , 2001, Proceedings 24th Australian Computer Science Conference. ACSC 2001.
[9] S. Griffis. EDITOR , 1997, Journal of Navigation.
[10] Yiannis Tsiounis,et al. On the Security of ElGamal Based Encryption , 1998, Public Key Cryptography.
[11] Ravi S. Sandhu,et al. Role activation hierarchies , 1998, RBAC '98.
[12] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[13] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[14] Paul Syverson,et al. Onion Routing for Anonymous and Private Internet Connections , 1999 .
[15] Konstantin Beznosov,et al. Supporting relationships in access control using role based access control , 1999, RBAC '99.
[16] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[17] David Pointcheval,et al. Self-Scrambling Anonymizers , 2000, Financial Cryptography.
[18] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[19] Michael Stumm,et al. NetCents: A Lightweight Protocol for Secure Micropayments , 1998, USENIX Workshop on Electronic Commerce.
[20] D. Richard Kuhn,et al. A role-based access control model and reference implementation within a corporate intranet , 1999, TSEC.
[21] Benjamin Cox,et al. NetBill Security and Transaction Protocol , 1995, USENIX Workshop on Electronic Commerce.
[22] Yanchun Zhang,et al. A Protocol for Untraceable Electronic Cash , 2000, Web-Age Information Management.
[23] Paul F. Syverson,et al. Onion routing , 1999, CACM.