A fair and secure group buying system based on arbitration computing mechanism
暂无分享,去创建一个
[1] Katia P. Sycara,et al. Customer Coalitions in Electronic Markets , 2000, AMEC.
[2] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[5] Jung-San Lee,et al. An innovative electronic group-buying system for mobile commerce , 2013, Electron. Commer. Res. Appl..
[6] Li Chen,et al. Group-Buying E-Commerce in China , 2012, IT Professional.
[7] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[8] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[9] Xiong Li,et al. An enhanced smart card based remote user password authentication scheme , 2013, J. Netw. Comput. Appl..
[10] Ho-fung Leung,et al. Fairness in secure computing protocols based on incentives , 2016, Soft Comput..
[11] Athanasios V. Vasilakos,et al. TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[12] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[13] Athanasios V. Vasilakos,et al. Flexible Data Access Control Based on Trust and Reputation in Cloud Computing , 2017, IEEE Transactions on Cloud Computing.
[14] Jianhua Li,et al. Escrowable identity-based authenticated key agreement protocol with strong security , 2013, Comput. Math. Appl..
[15] Zuowen Tan. A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments , 2012, J. Netw. Comput. Appl..
[16] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[17] Chin-Ling Chen,et al. A fair online payment system for digital content via subliminal channel , 2011, Electron. Commer. Res. Appl..
[18] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[19] Athanasios V. Vasilakos,et al. SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.
[20] Athanasios V. Vasilakos,et al. Two Schemes of Privacy-Preserving Trust Evaluation , 2016, Future Gener. Comput. Syst..
[21] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[22] Pulak Mishra,et al. Mergers, Acquisitions and Export Competitive- ness: Experience of Indian Manufacturing Sector , 2012 .
[23] Han-Zhi Song. The B2C group-buying model on the Internet , 2011, 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC).
[24] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[25] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[26] Athanasios V. Vasilakos,et al. A Framework for Truthful Online Auctions in Cloud Computing with Heterogeneous User Demands , 2016, IEEE Transactions on Computers.
[27] Athanasios V. Vasilakos,et al. Toward Incentivizing Anti-Spoofing Deployment , 2014, IEEE Transactions on Information Forensics and Security.
[28] Athanasios V. Vasilakos,et al. Incentive-Compatible Online Mechanisms for Resource Provisioning and Allocation in Clouds , 2014, 2014 IEEE 7th International Conference on Cloud Computing.
[29] Athanasios V. Vasilakos,et al. Provably secure three-party authenticated key agreement protocol using smart cards , 2014, Comput. Networks.
[30] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[31] Athanasios V. Vasilakos,et al. An Online Mechanism for Resource Allocation and Pricing in Clouds , 2016, IEEE Transactions on Computers.