1 |
F. Bao, R. H. Deng and P. Feng, “An Efficient and Practical Scheme for Privacy Protection in the E-commerce of Digital Goods,” International Conference on Information and Communication Security(ICICS'00), LNCS 2836, pp.162-170, 2001
DOI
ScienceOn
|
2 |
W. Zhao, V. Varadharajan and Y. Mu, “A Secure Mental Porker Protocol over the Internet,” Australasian Information Security Workshop(AISW'03), Vol.21, pp.105-109, 2003
|
3 |
M. Mambo, K. Usuda, and E. Okamoto, “Proxy signature for delegating signing operation”, Proc. Third ACM Conference on Computer and Communications Security, pp.48-57, 1996
|
4 |
A. Romao and M. M da Silva, “Secure Mobile Agent Digital Signature with Proxy Certificates,” E-Commerce Agents, LNCS 2033, pp.206-220, 2001
DOI
ScienceOn
|
5 |
S. Goldwasser and S. Micali, “Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information,” ACM Symposium on Theory of Computing (STOC'82), pp.365-377, 1982
|
6 |
M. Mambo, K. Usuda and E.Okanmoto, “Proxy signature: delegation of the power to sign messages,” IEICE Transaction on Fundamentals, Vol. E79-A, No.9, pp.1338-1353, 1996
|
7 |
J. G. Choi and J .H. Park, “A generalization of an anonymous buyer-seller watermarking protocol and its application to mobile communication,” IWDW'04, LNCS 3304, pp.232-242, 2004
|
8 |
E. F. Brickell and Y. Yacobi, “On Privacy Homomorphisms,” Advances in Cryptology-EUROCRYPT'87, LNCS 304, pp.117-125, 1987
DOI
|