Check out the new USENIX Web site. next up previous
Next: About this document ... Up: VarietyCash: a Multi-purpose Electronic Previous: Summary

References

1
M. ABDALLA, M. BELLARE AND P. ROGAWAY. DHAES: An encryption scheme based on the Diffie-Hellman problem. Manuscript.

2
M. BELLARE, A. DESAI, D. POINTCHEVAL AND P. ROGAWAY. Relations among notions of security for public-key encryption schemes. CRYPTOname: Proceedings, Lecture Notes in Computer Science Vol. CRYPTOvol:, CRYPTOed: ed., Springer-Verlag, 1998.

3
M. BELLARE, J. GARAY, R. HAUSER, A. HERZBERG, H. KRAWCZYK, M. STEINER, G. TSUDIK AND M. WAIDNER. iKP - A Family of Secure Electronic Payment Protocols. Proc. First Usenix Workshop on Electronic Commerce, pp. 89-106, New York, June 1995.

4
M. BELLARE, J. GARAY AND T. RABIN. Fast Batch Verification for Modular Exponentiation and Digital Signatures. EUROCRYPTname: Proceedings, Lecture Notes in Computer Science Vol. EUROCRYPTvol:, EUROCRYPTed: ed., Springer-Verlag, 1998.

5
M. BELLARE AND P. ROGAWAY. Optimal Asymmetric Encryption. EUROCRYPTname: Proceedings, Lecture Notes in Computer Science Vol. EUROCRYPTvol:, EUROCRYPTed: ed., Springer-Verlag, 1994.

6
D. BLEICHENBACHER. A chosen ciphertext attack against protocols based on the RSA encryption standard PKCS #1. CRYPTOname: Proceedings, Lecture Notes in Computer Science Vol. CRYPTOvol:, CRYPTOed: ed., Springer-Verlag, 1998.

7
J.-P. BOLY ET AL. The ESPRIT Project CAFE - High Security Digital Payment Systems. ESORICS '94, LNCS 875, Springer-Verlag, Berlin 1994, 217-230. <https://www.informatik.uni-hildesheim.de/FB4/Projekte/sirene/projects/cafe/index.html>.

1
R. CANETTI AND A. HERZBERG. Maintaining security in the presence of transient faults. CRYPTOname: Proceedings, Lecture Notes in Computer Science Vol. CRYPTOvol:, CRYPTOed: ed., Springer-Verlag, 1994.

8
D. Chaum. Blind signatures for untraceable payments. Advances in Cryptology - Crypto 82 Proceedings, D. Chaum, R. Rivest & A. Sherman eds., Plenum Press, New York, pp. 199-203.

9
CYBERCASH. The CyberCash(tm) System - How it Works. <https://www.cybercash.com/cybercash/cyber2.html>.

10
DIGICASH. About ecash. <https://www.digicash.com/ecash/ecash-home.html>.

11
D. DOLEV, C. DWORK, AND M. NAOR,
Non-malleable cryptography. 0=1STOCOneProc.Proceedings of the 01= 0 2=1 2 by 100 2 by 100 1 by -2 1=11 th1=12 th1=13 th 2=1 1 by 10 1 by 10 2 by -1 2=1 st2=2 nd2=3 rdth STOCname , STOCpub, 19:STOCOne Proc.Proceedings of the 01= 0 2=1 2 by 100 2 by 100 1 by -2 1=11 th1=12 th1=13 th 2=1 1 by 10 1 by 10 2 by -1 2=1 st2=2 nd2=3 rdth STOCname, STOCpub, 19:!:}91.

2
M. FRANKLIN AND M YUNG. Blind Weak Signature and its Applications. EUROCRYPTname: Proceedings, Lecture Notes in Computer Science Vol. EUROCRYPTvol:, EUROCRYPTed: ed., Springer-Verlag, 1994.

3
A. HERZBERG AND S. JARECKI AND H. KRAWCZYK AND M. YUNG. Proactive Secret Sharing. CRYPTOname: Proceedings, Lecture Notes in Computer Science Vol. CRYPTOvol:, CRYPTOed: ed., Springer-Verlag, 1985.

12
W3C JOINT ELECTRONIC PAYMENTS INITIATIVE (JEPI). <https://www13.w3.org/ECommerce/Overview-JEPI.html>.

13
M. JAKOBBSON AND M. YUNG. Revokable and versatile electronic money. 96= 93Proceedings of the First Annual Conference on Computer and Communications Security, ACM, 199396= 94Proceedings of the Second Annual Conference on Computer and Communications Security, ACM, 199496= 96Proceedings of the Third Annual Conference on Computer and Communications Security, ACM, 199696= 97Proceedings of the Fourth Annual Conference on Computer and Communications Security, ACM, 1997 This CCS not yet defined! .

14
MONDEX. <https://www.mondex.com>.

15
G. MEDVINSKY. NetCash: A framework for electronic currency. Ph. D thesis, Dept. of Computer Science, USC, 1997.

16
G. MEDVINSKY, C. NEUMAN. NetCash: A design for practical electronic currency on the Internet. 93= 93Proceedings of the First Annual Conference on Computer and Communications Security, ACM, 199393= 94Proceedings of the Second Annual Conference on Computer and Communications Security, ACM, 199493= 96Proceedings of the Third Annual Conference on Computer and Communications Security, ACM, 199693= 97Proceedings of the Fourth Annual Conference on Computer and Communications Security, ACM, 1997 This CCS not yet defined! . <ftp://prospero.isi.edu/pub/papers/security/netcheque-requirements-compcon95.ps.Z>.

17
C. NEUMAN. Proxy-based authorization and accounting for distributed systems. Proc. 13th International Conf. on Distributed Computing Systems, pp. 283-291, May 1993.

18
C. NEUMAN, G. MEDVINSKY. Requirements for Network Payment: The NetCheque Perspective. IEEE COMPCON, March 95. <ftp://prospero.isi.edu/pub/papers/security/netcheque-requirements-compcon95.ps.Z>.

19
M. SIRBU, J. D. TYGAR. NetBill: An Internet Commerce System. IEEE COMPCON, March 95. <https://www.ini.cmu.edu/netbill/CompCon.html>.

20
SECURE ELECTRONIC MARKETPLACE FOR EUROPE (SEMPER). <https://www.semper.org/>.

21
SET. <https://www.mastercard.com/set/>.

22
D. TYGAR. Atomicity in electronic commerce. Invited talk and paper, Proc. Fifteenth Annual ACM Symposium on Principles of Distributed Computing,, pp. 8-26, Philadelphia, May 1996.

23
M. WEGMAN AND L. CARTER. New hash functions and their use in authentication and set equality. J. of Computer and System Sciences 22, pp. 265-279, 1981.


Juan A. Garay
7/20/1998