1. N. Alexandris, M. Burmester, V. Chrissikopoulos and Yvo Desmedt, Secure Linking of Customers, Merchants and Banks in Electronic Commerce, Security on the Web, Future Generation Computer Systems, Elsevier Science B.V., to appear.
2. M. Bellare, P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, Proceedings of the First Annual Conference on Computer and Communications Security, ACM Press (1993), 62–73.
3. M. Bellare, J. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik and M. Waidner, iKP — A Family of Secure Electronic Payment Protocols, Proceedings of the 1st Usenix Electronic Commerce Workshop, New York (1995), 1–20.
4. S. Bengio, G. Brassard, Y. G. Desmedt, C. Goutier and J.-J. Quisquater, Secure implementations of identification systems, Journal of Cryptology, 4 (1991), 175–183.
5. J.P. Boly et al, The ESPRIT Project CAFE, Computer Security, ESORICS ‘84, Third European Research in Computer Security, Proceedings, Lecture Notes in Computer Science 875 (1994), Springer-Verlag, 217–230.