共 24 条
- [1] Blum M.(1983)How to exchange (secret) keys ACM Transactions on Computer Systems 1 175-193
- [2] Boneh D.(2000)Timed Commitments Advances in Cryptology ‐ CRYPTO'2000 1880 236-254
- [3] Naor M.(1987)Gradual and verifiable release of a secret Advances in Cryptology ‐ CRYPTO'87 293 156-166
- [4] Brickell E.F.(1990)Value exchange systems enabling security and unobservability Computers & Security 9 715-721
- [5] Chaum D.(2001)Rational exchange ‐ A formal model based on game theory Electronic Commerce ‐ WELCOM 2001 2232 114-126
- [6] Damgård I.B.(1988)Untraceable electronic cash Advances in Cryptology ‐ CRYPTO'88 401 319-327
- [7] van de Graaf J.(2000)Secure mobile agent-based merchant brokering in distributed marketplaces Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents (ASA/MA2000) 1882 44-56
- [8] Bürk H.(2000)Solving fair exchange with mobile agents ASA/MA 2000 1882 57-72
- [9] Pfitzmann A.(2001)Using smart cards for fair exchange Electronic Commerce ‐ WELCOM 2001 2232 101-113
- [10] Buttyàn L.(1999)A secure pay-per-view scheme for Web-based video service Public Key Cryptography ‐ PKC'99 1560 315-326