Author:
Li Ninghui,Du Wenliang,Boneh Dan
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science
Reference29 articles.
1. Aiello B, Ishai Y, Reingold O: Priced oblivious transfer: How to sell digital goods. In: Advances in Cryptology: EUROCRYPT ‘01, May 2001, pp 119-135
2. Asokan N, Shoup V, Waidner M: Optimistic fair exchange of digital signatures. IEEE J Selected Areas Commun 18(4):591-610 (2000)
3. Balfanz D, Durfee G, Shankar N, Smetters D, Staddon J, Wong H-C: Secret handshakes from pairing-based key agreements. In: Proceedings of the IEEE Symposium and Security and Privacy, May 2003, pp 180-196
4. Bao F, Deng RH, Mao W: Efficient and practical fair exchange protocols with off-line TTP. In: Proceedings of the 1998 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, May 1998, pp 77-89
5. Bellare M, Rogaway P: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, ACM Press, 1993, pp 62-73
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献