Properties of secure transaction protocols
暂无分享,去创建一个
[1] Mohamed G. Gouda,et al. A protocol for secure transactions , 1996 .
[2] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[3] J. D. Tygar,et al. Building blocks for atomicity in electronic commerce , 1996 .
[4] Marvin A. Sirbu,et al. NetBill: An Internet commerce system optimized for network delivered services , 1995, Digest of Papers. COMPCON'95. Technologies for the Information Superhighway.
[5] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[6] D SchlichtingRichard,et al. Preserving and using context information in interprocess communication , 1989 .
[7] J. Doug Tygar,et al. Atomicity in electronic commerce , 1996, NTWK.
[8] Bruce Schneier. "E-mail Security - How to keep your Electronic Messages Private": E-mail security by Bruce Schneier 1995 (John Wiley & Sons 365 pp.) isbn 0-471-05318-X , 1995, Comput. Law Secur. Rev..
[9] Marvin A. Sirbu,et al. NetBill: an Internet commerce system optimized for network-delivered services , 1995, IEEE Wirel. Commun..
[10] V. Hardman. Author Information , 2021, Disability and Health Journal.
[11] Michael K. Reiter,et al. Securing Causal Relationships in Distributed Systems , 1995, Comput. J..
[12] Bruce S. Davie,et al. Computer Networks: A Systems Approach , 1996 .
[13] Andreas Reuter,et al. Transaction Processing: Concepts and Techniques , 1992 .
[14] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[15] Robbert van Renesse,et al. Reliable Distributed Computing with the Isis Toolkit , 1994 .
[16] Richard D. Schlichting,et al. Preserving and using context information in interprocess communication , 1989, TOCS.
[17] Sean W. Smith,et al. Signed Vector Timestamps: A Secure Protocol for Partial Order Time , 1993 .