|
[1] B. B. Anderson, J. V. Hansen, P. B. Lowry and S. L. Summers, "Standards and Verication for Fair-Exchange and Atomicity in E-Commerce Transactions," Information Sciences, Vol. 176, No. 8, pp. 1045-1066, 2006.
[2] Z. Aneta and K. Zbigniew, "A Light-Weight E-Voting System with Distributed Trust," Electronic Notes in Theoretical Computer Science, Vol. 168, pp. 109-126, 2007.
[3] N. Asokan, P. A. Janson, M. Steiner and M. Waidner, "The State of The Art in Electronic Payment Systems," IEEE Computer, Vol. 30, pp. 28-35, 1997.
[4] N. Asokan, V. Shoup and M.Waidner, "Optimistic Fair Exchange of Digital Signature," in Proceedings of Financial EUROCRYPTO'98, Springer-Verlag, pp. 591- 606, 1998.
[5] N. Asokan, V. Shoup and M. Waidner, "Asynchronous Protocols for Optimistic Fair Exchange," in Proceedings of the 1998 IEEE symposium on security and privacy, Oakland, CA, USA, pp. 86-99, 1998.
[6] G. Ateniese, J. Camenisch, M. Joye and G. Tsudik, "A Practical and Provably Secure Coalition-Resistant Group Signature Scheme," Advance in Cryptology-CRYPTO 2000, Springer-Verlag, pp. 255-270, 2000.
[7] G. Ateniese and G. Tsudik, "Some Open Issues and New Directions in Group Signatures," in Proceedings of Financial CRYPTO'99, Springer-Verlag, pp. 196-211, 1999.
[8] I. G. Bae, B. H. Cho, J. S. Kim, J. H. Bae and K. Y. Yoo, "Online Fingerprint Verication System using Direct Minutia Extraction," in Proceedings of 13th International Conference on Computer Applications in Industry and Engineering, pp. 120-123, 2000.
[9] F. Bao, R. H. Deng and W. Mao, "Efficient and Practical Fair Exchange Protocols with Off-line TTP," in Proceedings of the 1998 IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 77-85, 1998.
[10] C. Boyd and E. Foo, "Off-line Fair Payment Protocol using Convertible Signature," Advances in Cryptology, in Proceedings of ASIACRYPT'98, LNCS 1514, Springer-Verlag, pp. 271-285, 1998.
[11] C. Cachin, "Efficient Private Bdding and Auctions with An Oblivious TrirdParty," in Proceedings of 6th ACM Conference on Computer and Communications Security, pp. 120-127, 1999.
[12] J. Camenisch and M. Michels, "A Group Signature Scheme with Improved Efficiency," Advances in Cryptology-ASIACRYPT'98, Springer-Verlag, pp. 160-174, 1998.
[13] C.-C. Chang and Y.-F. Chang, "Efficient Anonymous Auction Protocols with Freewheeling Bids," Computers and Security, Vol. 22, No. 8, pp. 728-734, 2003.
[14] Y.-F. Chang and C.-C. Chang, "Enhanced Anonymous Auction Protocols with Freewheeling Bids," in Proceedings of 20th International Conference on Advanced Information Networking and Applicatn (AINA 2006), pp. 353-358, 2006.
[15] C.-C. Chang and Y.-P. Lai, "A Flexible Date-Attachment Scheme on E-Cash," Computer and Security, Vol. 22, No. 2, pp. 160-166, 2003.
[16] C.-C. Chang and I.-C. Lin, "Remarks of Fingerprint-Based Remote User Authentication Scheme using Smart Card," ACM SIGOPS Operating Systems Review, Vol. 38, No. 4, pp. 91-96, 2004.
[17] D. Chaum and H. Antwerpen, "Undeniable Signatures," Advances in Cryptology-CRYPTO'89, Springer-Verlag, Vol. 435, pp. 212-216, 1989.
[18] D. Chaum and E. V. Heyst, "Group Signatures," Advance in Cryptology-EUROCRYPT'91, Springer-Verlag, pp. 257-265, 1991.
[19] L. Chen and T. P. Pedersen, "New Group Signature Schemes," Advances in Cryptology-EUROCRYPT'94, Springer-Verlag, pp. 171-181, 1994.
[20] H.-Y. Chien, "Forging A Winning Bid in Mu-Varadharajan's E-Auction," WSEAS Transations on Business and Economics, Vol. 5, No. 1, pp. 1-8, 2008.
[21] Y.-F. Chung, K.-H. Huang, H.-H. Lee, F.-C. Lai and T.-S. Chen, "Bidder-Anonymous English Auction Scheme with Privacy and Public Veriability," Journal of Systems and Software, Vol. 81, No. 1, pp. 113-119, 2008.
[22] V. P. Crawford and P. S. Kuo, "A Dual Dutch Auction in Taipei: The Choice of Numeraire and Auction form in Multi-Object Auctions with Bundling," Journal of Economic Behavior and Organization, Vol. 51, No. 4, pp. 427-442, 2003.
[23] W. Die and M. Hellman, "New Direction in Cryptography," IEEE Transactions on Information Theory, pp. 644-654, 1976.
[24] Y. Dodis and L. Reyzin, "Breaking and Repairing Optimistic Fair Exchange from PODC," in Proceedings of ACM Workshop on Digital Rights Management (DRM 2003), pp. 47-54, 2003.
[25] T. ElGamal, "A Public-Key Cryptosystem and A Siguature Scheme Based on Discrete Logarithms," IEEE Transactions on Information Theory IT-31, pp. 469-472, 1985.
[26] C.-I. Fan, W.-K. Chen and Y.-S. Yeh, "Data Attachable Electronic Cash," Computer Communication, Vol. 23, No. 4, pp. 425-428, 2000.
[27] M. K. Franklin and M. K. Reiter, "The Design and Implementation of a Secure Auction Service," IEEE Transactions on Software Engineering, pp. 302-312, 1996.
[28] M. K. Franklin and M. K. Reiter, "Fair Exchange with A Semi-Trusted Third Party," in Proceedings of 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, pp. 1-5, 1997.
[29] L. Gong, "Increasing Availability and Security of An Authentication Service," IEEE Journal on Selected Areas in Communications, Vol. 1, No. 5, pp. 657-662, 1993.
[30] J. Heezen and W. Baets, "The Impact of Electronic Markets: The Case of The Dutch Flower Auctions," Journal of Strategic Information Systems, Vol. 5, No. 4, pp. 317-333, 1996.
[31] D. Hirakiuchi and K. Sakurai, "English vs. Sealed-Bid in Anonymous Electronic Auction Protocols," in Proceedings of 10th IEEE International Workshops on Enabling Technologies (WETICE 2001), pp.171-176, 2001.
[32] C.-L. Hsu, T.-S.Wu, M.-J. Li and M.-J. Shiu, "Forgery attacks on Improved Group Signature Scheme," in Proceedings of the 2003 National Computer Symposium (NCS 2003), Taichung, Republic of China (Taiwan), pp. CD-ROM, December, 2003.
[33] T. Hwang and Y. Chen and C.-S. Laih, "Non-Interactive Password Authentications without Password Table," in Proceedings of IEEE Region 10 Conference on Computer and Communication Systems, pp. 429-431, 1990.
[34] S.-Y. Hwang, H.-A. Wen and T. Hwang, "On The Security Enhancement for Anonymous Secure E-Voting over Computer Network," in Proceedings of 10th IEEE International Workshops on Enabling Technologies (WETICE'01), pp. 171-176, 2001.
[35] C. Ito, M. Iwaihara and Y. Kambayashi, "Fair Exchange under Limited Trust," in Proceedings of Third International Workshop on Technologies for E-Services, LNCS 2444, pp. 161-169, 2002.
[36] R. Jiang, L. Pan and J.-H. Li, "An Improvement on Efficient Anonymous Auction Protocols," Computers and Security, Vol. 24, No. 2, pp. 169-174, 2005.
[37] W.-S. Juang, H.-T. Liaw, P.-C. Lin and C.-K. Lin, "The Design of a Secure and Fair Sealed-Bid Auction Service," Mathematical and Computer Modelling, Vol. 41, No. 8-9, pp. 973-985, 2005.
[38] M.-K. Khan and J. Zhang, "Improving the Security of A Flexible Biometrics Remote User Authentication Scheme," Computer Standards and Interfaces, Vol. 29, No. 1, pp. 82-85, 2007.
[39] H. Kikuchi, M. Harkavy and J. D. Tygar, "Multi-Round Anonymous Auction," in Proceedings of the First IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pp. 62-69, June 1998.
[40] H. Kikuchi, S. Hotta, K. Abe and S. Nakanishi, "Resolving Winner and Winning Bid without Revealing Privacy of Bids," in Proceedings of International Workshop on Next Generation Internet (NGITA 2000), pp. 307-312, July 2000.
[41] H. Kikuchi, "(M+1)st-Price Auction," in Proceedings of The Fifth International Conference on Financial Cryptography 2001 (IFCA 2001), pp. 291-298, February 2001.
[42] J. Kilian and E. Petrank, "Identity Escrow," Advances in Cryptology-CRYPTO'98, Springer-Verlag, pp. 169-185, 1998.
[43] H. S. Kim, S. W. Lee and K. Y. Yoo, "ID-Based Password Authentication Scheme using Smart Card and Fingerprints," ACM SIGOPS Operating Systems Review, Vol. 37, No. 4, pp. 32-41, 2003.
[44] N. Koblitz, A. Menezes and S. Vanstone, "The State of Elliptic Curve Cryptography," Designs Codes Crypto, Vol. 19, No. 2-3, pp. 173-193, 2000.
[45] W.-C. Ku, S.-T. Chang and M.-H. Chiang, "Further Cryptanalysis of Fingerprint-Based Remote User Authentication Scheme using Smart Card," Electronics Letters, Vol. 41, No. 5, pp. 240-241, 2004.
[46] M. Kudo, "Secure Electronic Sealed-Bid Auction Protocol with Public Key Cryptography," IEICE Transactions on Fundamentals, Vol. E81-A, No. 1, pp. 20-27, 1998.
[47] L. Lamport, "Password Authentication with Insecure Communication," Communications of the ACM, Vol. 24, No. 11, pp. 770-772, 1981.
[48] W.-B. Lee and C.-C. Chang, "Efficient Group Signature Scheme Based on The Discrete Logarithm," IEE Proceedings Computers and Digital Techniques, Vol. 145, No. 1, pp. 15-18, 1998.
[49] B. Lee, K. Kim and J. Ma, "Efficient Public Auction with One-Time Registration and Public Veriability," in Proceedings of INDOCRYPT 2001, pp. 16-20, 2001.
[50] W.-B. Lee, K.-C. Liao and Y.-H. Hsiao, "The Security of User Efficient E-Cash Scheme with Anonymous Certicates," in Proceedings of the 12th Conference on Information Security, Taichung, Republic of China (Taiwan), pp. CD-ROM, May 2002.
[51] W.-B. Lee, Y.-H. Hsiao and K.-C. Liao, "Improved Proxy Deposit Protocol for E-Cash Systems," in Proceedings of the 12th Conference on Information Security, Taichung, Republic of China (Taiwan), pp. CD-ROM, May 2002.
[52] J. K. Lee, S. R. Ryn and K. Y. Yoo, "Fingerprint-Based Remote User Authentication Scheme using Smart Card," Electronics Letters, Vol. 38, No. 12, pp. 554-555, 2002.
[53] Z.-Y. Lee, H.-C. Yu and P.-J. Kuo, "An Analysis and Comparison of Dierent Types of Electronic Payment Systems," in Proceedings of the Portland International Conference on Management of Engineering and Technology, pp. 38-45, 2001.
[54] M.-J. Li and Justie S.-T. Juan, "A Practical English Auction Based on the Discrete Logarithms," in Proceedings of the 2007 International Conference on Security and Management (SAM 2007), Vol. 1, pp. 413-419, 2007.
[55] M.-J. Li and Justie S.-T. Juan, "Efficient Biometrics Remote User Authentication Scheme," in Proceedings of the 2008 International Conference on Security and Management (SAM 2008), Vol. 1, pp. 87-90, 2008.
[56] M.-J. Li and Justie S.-T. Juan, "A Practical Fair Electronic Auction Scheme with Physical Delivery," in Proceedings of the 20th International Conference on Information Management (ICIM 2009), Shih Hsin University, Taipei, Republic of China (Taiwan), pp. 1459-1468, May 23, 2009.
[57] M.-J. Li and Justie S.-T. Juan, "New Cryptanalysis of an ID-Based Password Authentication Scheme using Smart Cards and Fingerprints," International Journal of Engineering Science and Technology (IJEST), Vol. 2, No. 11, pp. 6840-6844, 2010.
[58] H.-T. Liaw, W.-S. Juang and C.-K. Lin, "An Electronic Online Bidding Auction Protocol with Both Security and Efficiency," Applied Mathematics and Computation, Vol. 174, No. 2, pp. 1487-1497, 2006.
[59] I.-C. Lin and C.-C. Chang, "A Countable and Time-Bound Password-Based User Authentication Scheme for the Applications of Electronic Commerce," Information Sciences, Vol. 179, No. 9, pp. 1269-1277, 2009.
[60] C.-H. Lin and Y.-Y. Lai, "A Flexible Biometrics Remote User Authentication Scheme," Computer Standard and Interfaces, Vol. 27, No. 1, pp. 19-23, 2004.
[61] S. Liu and M. Wang, "Sealed-Bid Auctions based on Cobb-Douglas utility Function," Economics Letters, Vol. 107, No. 1, April, pp. 1-3, 2010.
[62] K. Nguyen and J. Traor'e, "An Online Public Auction Protocol Protecting Bidder Privacy," in Proceedings of Australasion Conference on Information Security and Privacy (ACISP 2000), pp. 427-442, 2000.
[63] D. O'Mahany, M. Peirce and H. Tewari, "Electronic Payment Systems," Artech House, Boston, pp. 145-185, 1997.
[64] K. Omote and A. Miyaji, "A Practical English Auction with One-Time Registration," Lecture Note in Computr Science of Information Security and Privacy-Proceedings on ACISP 2001, Springer-Verlag, pp. 221-234, 2001.
[65] K. Omote and A. Miyaji, "A Pratical English Auction with Simple Revocation," IEICE Transactions Fundamentals, Vol. E85-A, No. 5, pp. 1054-1061, 2002.
[66] J. Park, E. Chong and H. Siegel, "Constructing Fair-Exchange Protocols for E-Commerce via Distributes Computation of RSA Signature," in Proceedings of 2003 ACM Symposium on Principles of Distributed Computing (PODC 2003), pp. 172-181, July, 2003.
[67] N. K. Ratha, K. Karu, S. Chen and A. K. Jain, "A Real-Time Matching System for Large Fingerprint Databases," IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 18, No. 8, pp. 799-813, 1996.
[68] R. Rivest, "The MD-5 Message-Digest Algorithm," RFC 1321, Internet Activities Board, Internet Privacy Task Force, 1992.
[69] C. P. Schnorr, "Efficient Signature Generation for Smart Cards," Journal of Cryptology, Vol. 4, No. 3, pp. 239-252, 1991.
[70] A. Shamir, "Identity-Based Cryptosystems and Signature Scheme," Advances in Cryptology-CRYPTO'84, Springer-Verlag, Vol. 196, pp. 47-53, 1984.
[71] D.-H. Shih, H.-Y. Huang and D.-C. Yen, "A Secure Reverse Vickrey Auction Scheme with Bid Privacy," Information Sciences, Vol. 176, No. 5, pp. 550-564, 2006.
[72] M. Stadler, "Publicly Veriable Secret Sharing," Advances in Cryptology, in Proceedings of EUROCRYPT'96, LNCS 1070, Springer-Verlag, pp. 190-199, 1996.
[73] K. Suzuki, K. Kobayashi and H. Morita, "Efficient Sealed-Bid Auction using Hash Chain," in Proceedings of the 3th International Conference on Information Security and Cryptoogy (ICISC 2000), pp. 189-197, 2000.
[74] A. Verma, M. K. Tiwari and N. Mishra, "Minimizing Time Risk in On-line Bidding: An Adaptive Information Retrieval based Approach," Expert Systems with Applications, Vol. 38, No. 4, April, pp. 3679-3689, 2011.
[75] C.-F. Wang, J.-H. Ge, X.-J. Du, J. Qu, T.-S. Zhao and S.-Y. Yang, "A Multi-Party Non-Repudiation Protocol with Semi-Trusted Third Party," in Proceedings of IEEE TENCON 2002, pp. 188-191, 2002.
[76] C.-H. Wang, C.-H. Yin and C.-H. Juan, "How to Protect Exchanged Secrets in the Fair Exchange Protocol with Off-line TTP," Computers and Electrical Engineering, Vol. 32, No. 5, pp. 364-375, 2006.
[77] Q. Wu, H. Zhang and J. Pu, "A Fair-Exchange Protocol Based on Off-line Semi-Trusted Third Part," International Journal of Computer Science and Network Security (IJCSNS), Vol. 7, No. 7, pp. 208-212, 2007.
[78] S. Xia and J. You, "A Group Signature Scheme with Strong Separability," Journal of Systems and Software, Vol. 60, No. 3, pp. 177-182, 2002.
[79] Z. Zhao, M. Naseri and Y. Zheng, "Secure Quantum Sealed-Bid Auction with Post-Conrmation," Optics Communications, Vol. 283, No. 16, August 15, pp. 3194-3197, 2010.
[80] J. Zhou, R. Deng and F. Bao, "Some Remarks on a Fair Exchange Protocol," in Proceedings of Third International Workshop on Practice and Theory in Public Key Cryptosystems, LNCS 1751, pp. 46-57, 2000.
|