The SCEAS System
Navigation Menu

Conferences in DBLP

Security Protocols Workshop (spw)
1996 (conf/spw/1996)

  1. Wenbo Mao
    On Cryptographic Techniques for On-line Bankcard Payment Transactions Using Open Networks. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:1-17 [Conf]
  2. Bruno Crispo, T. Mark A. Lomas
    A Certification Scheme for Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:19-32 [Conf]
  3. Eiichiro Fujisaki, Tatsuaki Okamoto
    Practical Escrow Cash System. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:33-48 [Conf]
  4. Ross J. Anderson, Charalampos Manifavas, Chris Sutherland
    NetCard - A Practical Electronic-Cash System. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:49-57 [Conf]
  5. Torben P. Pedersen
    Electronic Payments of Small Amounts. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:59-68 [Conf]
  6. Ronald L. Rivest, Adi Shamir
    PayWord and MicroMint: Two Simple Micropayment Schemes. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:69-87 [Conf]
  7. David Wheeler
    Transactions Using Bets. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:89-92 [Conf]
  8. Marc Joye, Jean-Jacques Quisquater
    Protocol Failures for RSA-Like Functions Using Lucas Sequences and Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:93-100 [Conf]
  9. Ronald Cramer, Ivan Damgård, Torben P. Pedersen
    Efficient and Provable Security Amplifications. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:101-109 [Conf]
  10. Thomas W. Cusick
    A Comparison of RSA and the Naccache-Stern Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:111-116 [Conf]
  11. Burton S. Kaliski Jr.
    IEEE P1363: A Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:117-118 [Conf]
  12. Mike Burmester, Yvo Desmedt
    Efficient and Secure Conference-Key Distribution. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:119-129 [Conf]
  13. Chae Hoon Lim, Pil Joong Lee
    Directed Signatures and Application to Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:131-138 [Conf]
  14. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Key Escrow in Mutually Mistrusting Domains. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:139-153 [Conf]
  15. Bruce Schneier, John Kelsey
    Automatic Event-Stream Notarization Using Digital Signatures. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:155-169 [Conf]
  16. Bruce Christianson, William S. Harbison
    Why Isn't Trust Transitive? [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:171-176 [Conf]
  17. Shaw-Cheng Chuang, David J. Greaves
    Securing the Residential Asynchronous Transfer Mode Networks. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:177-196 [Conf]
  18. Moni Naor, Adi Shamir
    Visual Cryptography II: Improving the Contrast Via the Cover Base. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:197-202 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002