A Secure Pay-per View Scheme for Web-Based Video Service
暂无分享,去创建一个
[1] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[2] Kellogg S. Booth. Authentication of signatures using public key encryption , 1981, CACM.
[3] Dieter Gollmann,et al. Evidence and non-repudiation , 1997 .
[4] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[5] N. Asokan,et al. Asynchronous protocols for optimistic fair exchange , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[6] Chris Mitchell,et al. Security defects in CCITT recommendation X.509: the directory authentication framework , 1990, CCRV.
[7] Torben P. Pedersen. Electronic Payments of Small Amounts , 1995, Security Protocols Workshop.
[8] Dieter Gollmann,et al. A fair non-repudiation protocol , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[9] Robert H. Deng,et al. Efficient and practical fair exchange protocols with off-line TTP , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[10] Donal O'Mahony,et al. Secure pay-per-view testbed , 1995, Proceedings of the International Conference on Multimedia Computing and Systems.
[11] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[12] Michael K. Reiter,et al. Fair Exchange with a Semi-Trusted Third Party (extended abstract) , 1997, CCS.
[13] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[14] Jianying Zhou,et al. Securing digital signatures for non-repudiation , 1999, Comput. Commun..
[15] David M'Raïhi,et al. Cryptographic smart cards , 1996, IEEE Micro.
[16] Selim G. Aki. Digital signatures: A tutorial survey , 1983, Computer.