Abad-Peiro et al., "Designing a Generic Payment Service" (Nov. 26, 1996). |
Asokan et al., "Optimistic Protocols for Multi-Party Fair Exchange," IBM Research Report RZ 2892 (Dec. 9, 1996). |
Asokan et al., "Optimistic Fair Exchange of Digital Signatures," IBM Research Report. |
Asokan et al., "The State of the Art in Electronic Payment Systems," IEEE Computer, Sep. 1997, pp. 28-35. |
Asokan et al., "Optimistic Fair Exchange of Digital signatures" Advances in Cryptology (K. Nyberg, ed.), Proc. Eurocrypt 198 , pp. 591-606 (1997). |
Asokan et al., "Optimistic Protocols for Fair Exchange," IBM Research Report RZ 2858 (Sep. 2, 1996). |
Asokan et al., "Server-Supported Signatures," Proceedings of ESORICS '96 (Sep. 25-27, 1996). |
Asokan et al., "Server-Supported Signatures," Journal of Computer Security pp. 1-13 (1997). |
Asokan et al., "Asynchronous Protocols for Optimistic Fair Exchange," IBM Research Report, Proc. IEEE Symposium on Research in Security and Privacy, pp. 86-99 (1998). |
Baetlaan et al., "Internet Billing Service Design and Prototype Implementation," Carnegie Mellon University Information Networking Institute 1992 Final Project (Mar. 30, 1993). |
Bellare et al., "iKP--A Family of Secure Electronic Payment Protocols" (Jul. 12, 1995). |
Ben-Or et al., "A Fair Protocol for Signing Contracts," IEEE Transactions on Information Theory, v. 36 n. 1, pp. 40-46 (Jan. 1990). |
Ben-Or et al., "A Fair Protocol for Signing Contracts," Automata, Languages and Programming, pp. 43-52 (Jul. 1985). |
Blum, M., "How to Exchange (Secret) Keys," ACM Transactions on Computer Systems, v. 1 n. 2, pp. 175-193 (May 1983). |
Burk et al., "Digital Payment Systems Enabling Security and Unobservability," Computers & Security, v. 8, pp. 399-416 (1989). |
Burk et al., "Value Exchange Systems Enabling Security and Unobservability," Computers & Security, v. 9, pp. 715-720 (1990). |
Camenisch et al., "Digital Payment Systems with Passive Anonymity-Revoking Trustees" Journal of Computer Security (1996). |
Camensich et al., "An Efficient Fair Payment System," Proc. 3rd ACM Conf. on Computer Security, pp. 88-94 (1996). |
Casey et al., "Secure Automated Document Delivery," Fifth Annual Computer Security Applications Conference, pp. 348-356 (Dec. 4-8, 1989). |
Chaum, D., Security Without Identification: Transaction Systems to Make Big Brother Obsolete, Comm of ACM, vol. 28 No. 10, pp. 1030-1044 (Oct. 1985). |
Chaum, et al., Untraceable Electronic Cash, Proc. Crypto '88, pp. 329-327 (1988). |
Cheng, et al., Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX, IBM Thomas J. Watson Research Center (Apr. 28, 1995). |
Chor, et al., Verifiable Secret Sharing and Achieving Simultaneity in the Present of Faults, POC, 26th FOCS, pp. 383-395. |
Damgard, I., Payment Systems and Credential Mechanisms With Provable Security Against Abuse by Individuals, Proc Crypto '88, pp. 328-335 (1988). |
DeMillo, et al., Protocols for Data Security, IEEE Computer, pp. 39-50 (Feb. 1983). |
Desmedt, et al., Threshold Cryptosystems, University of Wisconsin--Milwaukee, pp. 307-315. |
Dolev, et al., Non-Malleable Cryptography, Comm. of ACM, pp. 542-552 (Mar. 1991). |
Dukach, S., SNPP: A Simple Network Payment Protocol, M.I.T. Laboratory for Computer Science. |
Even, et al., A Randomized Protocol for Signing Contracts, Comm. of the ACM, vol. 28, No. 6, pp. 637-647 (Jun. 1995). |
Even, S., Secure Off-Line Electronic Fund Transfer Between Nontrusting Parties, Computer Science Department Technion, Israel Institute of Technology, pp. 1-10 (Jan. 31, 1988). |
Even, et al., On-Line/Off-Line Digital Signatures, International Association for Cryptographic Research, 1996, pp. 0-28. |
Frankel, et al., Indirect Discourse Proofs: Achieving Efficient Fair Off-Line E-Cash. |
Franklin, et al., Fair Exchange with a Semi-Trusted Third Party, Proc. of the 4th ACM Conf. on Computer and Comm. Security, Apr. 1997, pp. 1-6. |
Goldreich, et al., How to Play Any Mental Game, Proc. 27th Ann. IEEE ACM Symposium on Theory of Computing, pp. 218-229 (1987). |
Goldreich, et al., Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems, Association for Computing Machinery, vol. 38, No. 1, pp. 691-729 (Jul. 1991). |
Goldwasser, et al., The Knowledge Complexity of Interactive Proof Systems, SIAM J. Comput. vol. 18, No. 1, pp. 186-208 (Feb. 1989). |
Herda, S., Consulting evidence and proof in digital cooperation, Computer Standards and Interfaces 17 (1995), pp. 69-79. |
Hickman, et al., The SSL Protocol, Netscape Communications Corp. (Jun. 1995). |
Jakobsson, M., Reducing Costs in Identification protocols, Crypto '92 (1992). |
Janson, et al., Electronic Payment Over Open Networks, IBM Zurich Research Laboratory CH 8803 Ruschlikon, Switzerland (Apr. 18, 1995). |
Janson, et al., Electronic Payment Systems, pp. 1-24 (May 1, 1996). |
Kilian, J., et al., Identity Escrow, pp. 1-18. |
Koleta, G.B., Cryptographers Gather to Discuss Research, Science, pp. 646-647 (Nov. 11, 1981). |
Konheim et al., Digital Signatures and Authentications, Cryptography, A Primer, (1981), pp. 334-367. |
Low, et al., Anonymous Credit Cards, 2nd ACM Conference on Computer and Communication Security, pp. 1-10 (1994). |
Luby, et al., How to Simultaneously Exchange a Secret Bit by Flipping a Symmetrically-Biased Coin, IEEE, pp. 11-21 (1983). |
Myer, P., Cryptography: A guide for the design and implementation of crytptographic Systems, McGraw-Hill, Inc., pp. 386-430 (1982). |
Mueller-Schloer, et al., The Implementation of a Cryptography-Based Secure Office System, AFIPS Conference Proc. 1982, pp. 487-492 (1982). |
Needham, et al., Using Encryption for Authentication in Large Networks of Computers, Comm. of ACM, vol. 21, No. 12, pp. 993-999 (Dec. 1978). |
Pedersen, T., Electronic Payments of Small Amounts, Aarhus Univ. Tech. Rpt. DAIMI PB-495, pp. 1-12 (Aug. 1995). |
Otway, et al., Efficient and Timely Mutual Authentication, ACM Operating Systems Review, vol. 21, No. 1, pp. 8-10 (Jan. 1987). |
Neuman, et al., Requirements for Network Payment: The NetCheque.TM. Perspective, Proc. IEEE Compcon '95, San Francisco (Mar. 1995). |
Rabin, M., How To Exchange Secrets, (May 20, 1981) pp. 1-21. |
Rabin, M., Transaction Protection by Beacons, TR-29-81, Harvard University Center for Research in Computing Technology, (Nov. 1981) pp. 1-21. |
Rescorla et al., The Secure HyperText Transfer Protocol, Enterprise Integration Technologies, (Jul. 1995) pp. 1-40. |
Rihaczek, K., Teletrust, Computer Networks and ISDN Systems 13 (1987) pp. 235-239. |
Rivest et al., A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Programming Techniques (Feb. 1978) pp. 120-126. |
SEMPER Project AC026 ACTS Programme (Mar./Jul. 1995). |
Serenelli et al., Securing Electronic Mail Systems, MILCOM 92 (San Diego, CA 1992) pp. 29.1.1-29.1.4. |
Shamir, A., How to Share a Secret, Comm. ACM v. 22, n. 11 (Nov. 1979) pp. 612-613. |
Simmons, J., An Impersonation-Proof Identity Verification Scheme, Advances in Cryptology--CRYPTO '87, pp. 211-215. |
Simmons, J., Zero-Knowledge Proofs of Identity and Veracity of Transaction Receipts, Advances in Cryptology--EUROCRYPT 188, pp. 35-49. |
Simmons, A Protocol to Provide Verifiable Proof of Identity and Unforgeable Transaction Receipts, IEEE Journal on Selected Areas in Communications, vol. 7, No. 4, May 1989, pp. 435-447. |
Sirbu, et al., NetBill: An Internet Commerce System Optimized for Network Delivered Services, Engineering and Public Policy Department, Computer Science Department, Carnegie Mellon. University, Pittsburgh, Pennsylvania 15213, pp. 1-11. |
Snare, J.L., Secure Electronic Data Interchange, Computer Security in the Age of Information, (W.L. Caelli, ed.), IFIP, 1989, pp. 331-342, (1989). |
Sollins, K.R., Cascaded Authentication, IEEE Symposium on Security and Privacy (Apr. 18-21, 1988), pp. 156-163. |
Stadler et al, Fair Blind Signatures, Advances in Cryptology--EUROCRYPT '95 (1995). |
Stein et al., The Green Commerce Model, pp. 1-17, (Oct. 1994). |
Tsudik, G., Zurich iKP Prototype (ZiP), Protocol Specification Document, IBM Zurich Research, pp. i-27 (Mar. 5, 1996). |
Varadharajan et al., Formal Specification of A Secure Distributed Messaging System, 12th National Computer Security Conference Proceedings, pp. 146-171, (Oct. 1991). |
Varadharajan, V., Notification: A Practical Security Problem in Distributed Systems, 14th National Computer Security Conference, pp. 386-396, (Oct. 1991). |
Waidner, M., Development of a Secure Electronic Marketplace for Europe, Proc. of ESORICS 96, Rome, (Seq. 1996), pp. 1-15. |
Zhou et al., A Fair Non-Repudiation Protocol, IEEE (1996), pp. 55-61. |