Next: About this document ...
Up: VarietyCash: a Multi-purpose Electronic
Previous: Summary
- 1
- M. ABDALLA, M. BELLARE AND P. ROGAWAY. DHAES: An
encryption scheme based on the Diffie-Hellman problem. Manuscript.
- 2
- M. BELLARE, A. DESAI, D. POINTCHEVAL AND P. ROGAWAY.
Relations among notions of security for public-key encryption
schemes. CRYPTOname: Proceedings,
Lecture Notes in Computer Science Vol. CRYPTOvol:,
CRYPTOed: ed., Springer-Verlag, 1998.
- 3
- M. BELLARE, J. GARAY, R. HAUSER, A. HERZBERG, H. KRAWCZYK, M. STEINER, G. TSUDIK AND M. WAIDNER. iKP - A Family of Secure
Electronic Payment Protocols. Proc. First Usenix Workshop on Electronic
Commerce, pp. 89-106, New York, June 1995.
- 4
- M. BELLARE, J. GARAY AND T. RABIN.
Fast Batch Verification for Modular Exponentiation
and Digital Signatures. EUROCRYPTname: Proceedings,
Lecture Notes in Computer Science Vol. EUROCRYPTvol:,
EUROCRYPTed: ed., Springer-Verlag, 1998.
- 5
- M. BELLARE AND P. ROGAWAY. Optimal Asymmetric
Encryption. EUROCRYPTname: Proceedings,
Lecture Notes in Computer Science Vol. EUROCRYPTvol:,
EUROCRYPTed: ed., Springer-Verlag, 1994.
- 6
- D. BLEICHENBACHER.
A chosen ciphertext attack against protocols based on the RSA encryption
standard PKCS #1. CRYPTOname: Proceedings,
Lecture Notes in Computer Science Vol. CRYPTOvol:,
CRYPTOed: ed., Springer-Verlag, 1998.
- 7
- J.-P. BOLY ET AL. The ESPRIT Project CAFE - High
Security Digital Payment Systems. ESORICS '94, LNCS 875, Springer-Verlag,
Berlin 1994, 217-230. <https://www.informatik.uni-hildesheim.de/FB4/Projekte/sirene/projects/cafe/index.html>.
- 1
- R. CANETTI AND A. HERZBERG.
Maintaining security in the presence of transient faults. CRYPTOname: Proceedings,
Lecture Notes in Computer Science Vol. CRYPTOvol:,
CRYPTOed: ed., Springer-Verlag, 1994.
- 8
- D. Chaum. Blind signatures for untraceable payments.
Advances in Cryptology - Crypto 82 Proceedings, D. Chaum, R. Rivest &
A. Sherman eds., Plenum Press, New York, pp. 199-203.
- 9
- CYBERCASH. The CyberCash(tm) System - How it Works.
<https://www.cybercash.com/cybercash/cyber2.html>.
- 10
- DIGICASH. About ecash.
<https://www.digicash.com/ecash/ecash-home.html>.
- 11
-
D. DOLEV, C. DWORK, AND M. NAOR,
Non-malleable cryptography.
0=1STOCOneProc.Proceedings of the 01= 0
2=1
2 by 100
2 by 100
1 by -2
1=11
th1=12
th1=13
th
2=1
1 by 10
1 by 10
2 by -1
2=1
st2=2
nd2=3
rdth
STOCname
, STOCpub, 19:STOCOne Proc.Proceedings of the
01= 0
2=1
2 by 100
2 by 100
1 by -2
1=11
th1=12
th1=13
th
2=1
1 by 10
1 by 10
2 by -1
2=1
st2=2
nd2=3
rdth
STOCname, STOCpub, 19:!:}91.
- 2
- M. FRANKLIN AND M YUNG. Blind Weak Signature
and its Applications. EUROCRYPTname: Proceedings,
Lecture Notes in Computer Science Vol. EUROCRYPTvol:,
EUROCRYPTed: ed., Springer-Verlag, 1994.
- 3
- A. HERZBERG AND S. JARECKI AND H. KRAWCZYK AND M. YUNG.
Proactive Secret Sharing. CRYPTOname: Proceedings,
Lecture Notes in Computer Science Vol. CRYPTOvol:,
CRYPTOed: ed., Springer-Verlag, 1985.
- 12
- W3C JOINT ELECTRONIC PAYMENTS INITIATIVE (JEPI).
<https://www13.w3.org/ECommerce/Overview-JEPI.html>.
- 13
- M. JAKOBBSON AND M. YUNG. Revokable and versatile
electronic money. 96=
93Proceedings of the First Annual Conference on
Computer and Communications Security, ACM, 199396=
94Proceedings of the Second Annual Conference on
Computer and Communications Security, ACM, 199496=
96Proceedings of the Third Annual Conference on
Computer and Communications Security, ACM, 199696=
97Proceedings of the Fourth Annual Conference on
Computer and Communications Security, ACM, 1997
This CCS not yet defined!
.
- 14
- MONDEX. <https://www.mondex.com>.
- 15
- G. MEDVINSKY. NetCash: A framework for electronic
currency. Ph. D thesis, Dept. of Computer Science, USC, 1997.
- 16
- G. MEDVINSKY, C. NEUMAN. NetCash:
A design for practical electronic currency on the Internet.
93=
93Proceedings of the First Annual Conference on
Computer and Communications Security, ACM, 199393=
94Proceedings of the Second Annual Conference on
Computer and Communications Security, ACM, 199493=
96Proceedings of the Third Annual Conference on
Computer and Communications Security, ACM, 199693=
97Proceedings of the Fourth Annual Conference on
Computer and Communications Security, ACM, 1997
This CCS not yet defined!
.
<ftp://prospero.isi.edu/pub/papers/security/netcheque-requirements-compcon95.ps.Z>.
- 17
- C. NEUMAN.
Proxy-based authorization and accounting for distributed systems.
Proc. 13th International Conf. on Distributed Computing Systems,
pp. 283-291, May 1993.
- 18
- C. NEUMAN, G. MEDVINSKY. Requirements for
Network Payment: The NetCheque Perspective. IEEE COMPCON, March
95.
<ftp://prospero.isi.edu/pub/papers/security/netcheque-requirements-compcon95.ps.Z>.
- 19
- M. SIRBU, J. D. TYGAR. NetBill: An Internet
Commerce System. IEEE COMPCON, March 95.
<https://www.ini.cmu.edu/netbill/CompCon.html>.
- 20
- SECURE ELECTRONIC MARKETPLACE FOR EUROPE (SEMPER).
<https://www.semper.org/>.
- 21
- SET. <https://www.mastercard.com/set/>.
- 22
- D. TYGAR. Atomicity in electronic commerce. Invited talk
and paper, Proc. Fifteenth Annual ACM Symposium on Principles
of Distributed Computing,, pp. 8-26, Philadelphia, May 1996.
- 23
-
M. WEGMAN AND L. CARTER. New hash functions and their use in
authentication and set equality. J. of Computer and System Sciences
22, pp. 265-279, 1981.
Juan A. Garay
7/20/1998