|
[1] N. Asokan, M. Schunter and M. Waidner, “Optimistic protocols for fair exchange,” ACM Conference on Computer and Communications Security, Switzerland, pp. 6-17, April 1997. [2] N. Asokan, V. Shoup and M. Waidner, “Asynchronous protocols for optimistic fair exchange,” IEEE Symposium on Security and Privacy, Oakland, CA, pp.86-100, May 1998. [3] N. Asokan, V. Shoup and M. Waidner, “Optimistic fair exchange of digital signa-tures,” IEEE Journal on Selected Areas in Communications, vol. 18, pp.593-610, 2000. [4] F. Bao and R. Deng, “An efficient fair exchange protocol with an off-line semi-trusted third party,” International Workshop on Cryptographic Techniques and E-Commerce, pp.37-47, 1999. [5] I. Ray and I. Ray, “An optimistic fair exchange e-commerce protocol with automated dispute resolution,” First International Conference on Electronic Commerce and Web Technologies, EC-Web 2000, Lecture Notes in Computer Science, vol. 1875, Springer, Berlin, pp.84-93, 2000. [6] I. Ray and I. Ray, “An anonymous fair exchange e-commerce protocol,” 15th Interna-tional Parallel and Distributed Processing Symposium, pp.1790-1797, April 2001. [7] Q. Shi, N. Zhang and M. Merabti, “Signature-based approach to fair document ex-change,” IEE Proceedings-Communications, vol. 150, No. 1, pp.21-27, Feb. 2003. [8] Q. Shi, N. Zhang and M. Merabti, “An efficient protocol for anonymous and fair document exchange,” International Journal of Computer and Telecommunications Net-working, vol. 41, No. 1, pp.19-28, January 2003. [9] M. Franklin and M. Reiter, “Fair exchange with a semi-trusted third party,” ACM Conference on Computer and Communication Security, Zurich, Switzerland, pp.1-5, April 1997. [10] B. Schneier, Applied cryptography. John Wiley, 1996. [11] R. L. Rivest, A. Shamir and L.M. Adleman, “A method for obtaining digital signa-tures and public-key cryptosystems,” Communications of the ACM, pp. 120-126, 1978. [12] S. Low, N. Maxemchuk, and S. Paul, “Anonymous credit cards,” In J. Stern, editor, Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp.108-117, Fairfax, Virginia, Nov. 1994. [13] W. Stallings, Cryptography and Network Security: Principles and Practice. New Jer-sey: Prentice Hill, 1998.
|