The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ernest Foo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ernest Foo, Colin Boyd
    Passive Entities: A Strategy for Electronic Payment Design. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:134-148 [Conf]
  2. Colin Boyd, Ernest Foo, Chris Pavlovski
    Efficient Electronic Cash Using Batch Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:244-257 [Conf]
  3. Ming Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson
    A Mobile Agent System Providing Offer Privacy. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:301-312 [Conf]
  4. Vicky Liu, William J. Caelli, Ernest Foo, Selwyn Russell
    Visually Sealed and Digitally Signed Documents. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:287-294 [Conf]
  5. Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo
    Formal analysis of secure contracting protocol for e-tendering. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2006, pp:155-164 [Conf]
  6. Rong Du, Ernest Foo, Colin Boyd, Brian Fitzgerald
    Defining Security Services for Electronic Tendering. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2004, pp:43-52 [Conf]
  7. Colin Boyd, Ernest Foo
    Off-Line Fair Payment Protocols Using Convertible Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:271-285 [Conf]
  8. Matthew Henricksen, Ming Yao, Ernest Foo
    An Implementation of the Yao Forward Integrity Protocol for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:110-124 [Conf]
  9. Ming Yao, Kun Peng, Matthew Henricksen, Ernest Foo, Ed Dawson
    Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2004, pp:164-173 [Conf]
  10. Kevin Tham, Mark Looi, Ernest Foo
    Ubiquitous Authorization Scheme Based on Device Profile. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:312-321 [Conf]
  11. Ernest Foo, Colin Boyd
    A Payment Scheme Using Vouchers. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1998, pp:103-121 [Conf]
  12. Chris Pavlovski, Colin Boyd, Ernest Foo
    Detachable Electronic Coins. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:54-70 [Conf]
  13. Greg Maitland, Jason Reid, Ernest Foo, Colin Boyd, Ed Dawson
    Linkability in Practical Electronic Cash Design. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:149-163 [Conf]
  14. Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto
    Examining the DoS Resistance of HIP. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:616-625 [Conf]
  15. Ernest Foo, Colin Boyd, William J. Caelli, Ed Dawson
    A taxonomy of electronic cash schemes. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:337-348 [Conf]
  16. Rong Du, Colin Boyd, Ernest Foo
    A Secure E-Tender Submission Protocol. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:213-222 [Conf]
  17. Rong Du, Ernest Foo, Juan González Nieto, Colin Boyd
    Designing Secure E-Tendering Systems. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:70-79 [Conf]
  18. Ming Yao, Matthew Henricksen, Ernest Foo, Ed Dawson
    Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:132-141 [Conf]
  19. Ming Yao, Ernest Foo, Kun Peng, Ed Dawson
    An Improved Forward Integrity Protocol for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:272-285 [Conf]
  20. Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto
    Toward Non-parallelizable Client Puzzles. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:247-264 [Conf]

  21. Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets. [Citation Graph (, )][DBLP]


  22. Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA. [Citation Graph (, )][DBLP]


  23. Modeling and Verification of Privacy Enhancing Protocols. [Citation Graph (, )][DBLP]


  24. Strengthening SMS-Based Authentication through Usability. [Citation Graph (, )][DBLP]


  25. Conditional Privacy Using Re-encryption. [Citation Graph (, )][DBLP]


  26. RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  27. A User-Centric Protocol for Conditional Anonymity Revocation. [Citation Graph (, )][DBLP]


  28. Designing a secure e-tender submission protocol. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002