|
[1] N. Asokan, P. Janson, M. Steiner and M. Waidner ,"The State of the Art in Electronic Payment Systems", IEEE Computer, Volume:30, Issue:9, Sept. 1997, page(s): 28-35. [2] N. Asokan, V. Shoup, and M. Waidner, "Asynchronous protocols for optimistic fair exchange", In Proceedings of the IEEE Symposium on Research in Security and Privacy, May 1998, page(s): 86-99. [3] N. Asokan, V. Shoup, and M. Waidner, “Optimistic Fair Exchange of Digital Signatures,” IEEE Journal on Selected Areas in Communications Volume: 18, Issue: 4, April 2000, page(s): 591 -610. [4] N. Asokan, M. Schunter, and M. Waidner, "Optimistic Protocols for Multi-Party Fair Exchange", IBM Research Report RZ 2892, IBM Zurich Research Laboratory, Zurich,1996. [5] N. Asokan, M. Schunter, and M. Waidner, “Optimistic Protocols for Fair Exchange,” Proceedings of 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, April 1997, page(s): 6-17. [6] F. Bao, R. H. Deng, and W. Mao, “Efficient and Practical Fair Exchange Protocols with Off-line TTP,” 1998 Proceedings of IEEE Symposium on Security and Privacy, page(s): 77-85. [7] F. Bao, R.H. Deng and J. Zhou. "Electronic Payment Systems with Fair On-line Verification". Proceedings of 15th IFIP International Information Security Conference, August 2000, page(s): 451-460. [8] F. Bao, R. Deng, K. Q. Nguyen, and V. Varadharajan, "Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party", Proceedings of Tenth International Workshop on Database and Expert Systems Applications, 1999 page(s): 858-862. [9] B. Baum-Waidner, and M. Waidner, “Optimistic asynchronous multi-party contract signing”, Technical Report RZ3078, IBM Research Report, 1998. [10] C. Boyd, and E. Foo, “Off-line Fair Payment Protocols Using Convertible Signature,” In Advances in Cryptology - proceedings of Asiacrypt’98, Springer-Verlag, 1998, page(s): 271-285. [11] E. F. Brickell, D. Chaum, I. B. Damgard, and J. van de Graaf, “Gradual and Verifiable Release of a Secret,” Advances in Cryptology Proceedings of Crypto '87, page(s): 156-166. [12] H. Burk and A. Pfitzmann, "Value Exchange Systems Enabling Security and Unobservability", Computers & Security, Page(s):715-721, 1990. [13] J. Camenisch, J. Piveteau, and M. Stadler ,"An Efficient Fair Payment System", In Clifford Neuman, editor, 3rd ACM Conference on Computer and Communications Security, March 1996 page(s): 88—94. [14] R. Cleve, “Controlled Gradual Disclosure Schemes for Random Bits and Their Application,” Advances in Cryptology Proceedings of Crypto '89, page(s): 573-588. [15] D. Chaum, “ Zero-knowledge Undeniable Signature,” Proceedings of Eurocrypt'90, Page(s): 458-464. [16] D. Chaum, “ Designated Confirmer Signatures,” Proceedings of Eurocrypt'94, page(s): 86-91. [17] L. Chen, “ Efficient Fair Exchange with Verifiable Confirmation of Signatures”, In Advances in Cryptology-proceedings of Asiacrypt’98, Springer-Verlag 1998 ,page(s): 286-299 [18] I.B. Damgard, "Practical and Provably Secure Release of a Secret and Exchange of Signatures", Proceedings of Eurocrypt’93, page(s): 201-217. [19] R. H. Deng, L. Gong, A. A. Lazar, and W. Wang, “Practical Protocol for Certified Electronic Mail,” Journal of Network and Systems Management, vol. 4, no. 3, 1996, page(s): 279-297. [20] T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms,” IEEE Transactions on Information Theory, July 1985, page(s):469-472. [21] M. K. Franklin, and M. K. Reiter, “Fair Exchange with a Semi-Trusted Third Party,” In Proceedings of The Fourth ACM Conference on Computer and Communications Security, Zurich, April 1997, page(s): 1-6. [22] M. Franklin and G. Tsudik ,"Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties", Research supported by the Defense Advanced Research Project Agency, Information Technology Office (DARPA-ITO), under contract DABT63-97-C-0031 [23] Juan A. Garay, M. Jakobsson, and P. MacKenzie, “Abuse-free optimistic contract signing”, To appear in CRYPTO 99, August 1999. [24] Juan A. Garay and P. MacKenzie, “Abuse-free Multi-party contract signing”,In DISC'99, LNCS 1693, Page(s):151-166 [25] R. Gennaro, H. Krawczyk, and T. Rabin, “RSA-Based Undeniable Signature,” Advances in Cryptology Proceedings of Crypto '97 Page(s): 132-149. [26] L. Harn, “Group-Oriented(t,n) Threshold Digital Signature Scheme and Digital Multisignature,” IEE Proc. comput. Digit. Tech, Vol.141 No.5,1994, Page(s):307-313. [27] M. Jakobsson ,"Ripping Coins for a Fair Exchange", M. Jakobsson. Ripping coins for a fair exchange. Proceedings of Eurocrypt'95, Page(s): 220-230. [28] M. Michels, and M. Stadler, “Generic Constructions for Secure and Efficient Confirmer Signature Scheme,” Proceedings of Eurocrypt'98, Page(s): 406-421. [29] T. Okamoto, and K.Ohta, “How to Simultaneously Exchange Secrets by General Assumption,” Proceedings of 2nd ACM Conference on Computer and Communications Security 1994, page(s):184-192. [30] I. Ray, and Indrajit Ray, "An Anonymous Fair-Exchange E-Commerce Protocol", Proceedings of the First International Workshop on Internet Computing and E-Commerce, San Francisco, CA, April 2001. [31] C. P. Schnorr, “Efficient Identification and Signatures for Smart Cards,” Advances in Cryptology Proceedings of Crypto'89, page(s):239-252. [32] M. Starler, “Publicly Verifiable Secret Sharing,” Proceedings of Eurocrypt’96, LNCS 1070, Springer-Verlag, 1996, page(s):190-199. [33] T. Tedrick, "Fair Exchange of Secrets", Advances in Cryptology Proceedings of Crypto '84 Page(s): 434-438. [34] C. H. Wang, “Untraceable Fair Network Payment Protocols with Off-Line TTP,” Proceedings of Asiacrypto 2003, LNCS 2894, page(s):173–187. [35] C. K. Wu, and V. Varadharajan, “Fair Exchange of Digital Signatures with Off-line Trusted Third Party,” Proceedings of Information and Communications Security (ICICS2001), LNCS 2229, Springer-Verlag 2001, page(s): 466-470. [36] J. Zhou, and D. Gollman, “A Fair Non-repudiation Protocol,” in Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, 1996, IEEE Computer Press, page(s):55-61. [37] J. Zhou, and D. Gollmann, “An Efficient Non-repudiation Protocol,” Proceedings of 10th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, June 1997, page(s):126-132.
|