Sciweavers

289 search results - page 15 / 58
» A New Method to Security Electronic Commerce Protocol
Sort
View
SAC
2004
ACM
14 years 1 months ago
A secure method for signature delegation to mobile agents
This paper presents a novel method that allows the delegation of signature power to one or more entities that jointly play the role of a proxy signer. This work is different from ...
Omaima Bamasak, Ning Zhang
AGENTS
2001
Springer
14 years 4 days ago
Trust-based facilitator for e-partnerships
In this paper, we propose a facilitator that finds capable and trustworthy partners on behalf of client users, which helps users form and maintain e-partnerships for electronic co...
Chihiro Ono, Boyd C. Paulson Jr., Dai Kanetomo, Ma...
ICFEM
2003
Springer
14 years 25 days ago
A Z Based Approach to Verifying Security Protocols
Abstract. Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be dire...
Benjamin W. Long, Colin J. Fidge, Antonio Cerone
ICISS
2009
Springer
14 years 2 months ago
Remote Electronic Voting with Revocable Anonymity
We present a new remote, coercion-free electronic voting protocol which satisfies a number of properties previously considered contradictory. We introduce (and justify) the idea ...
Matt Smart, Eike Ritter
ASIACRYPT
2003
Springer
13 years 11 months ago
Untraceable Fair Network Payment Protocols with Off-Line TTP
A fair network payment protocol plays an important role in electronic commerce. The fairness concept in payments can be illustrated as that two parties (e.g. customers and merchant...
Chih-Hung Wang