3

CRYPTANALYSIS ON SCHWARTZ GRAPHICAL ENCRYPTION METHOD

Year:
1993
Language:
english
File:
PDF, 1.15 MB
english, 1993
8

A conventional approach to secret balloting in computer networks

Year:
1996
Language:
english
File:
PDF, 1.35 MB
english, 1996
11

Greater protection for credit card holders: a revised SET protocol

Year:
1998
Language:
english
File:
PDF, 282 KB
english, 1998
12

Access control with role attribute certificates

Year:
2000
Language:
english
File:
PDF, 240 KB
english, 2000
20

A trustworthy Internet auction model with verifiable fairness

Year:
2001
Language:
english
File:
PDF, 273 KB
english, 2001
23

Hiding Digital Information Using a Novel System Scheme

Year:
2001
Language:
english
File:
PDF, 99 KB
english, 2001
25

A Fair and Privacy-preserved Protocol for Sealed-bid Auctions

Year:
2001
Language:
english
File:
PDF, 301 KB
english, 2001
30

A transactional-cycle approach to evidence management for dispute resolution

Year:
2005
Language:
english
File:
PDF, 179 KB
english, 2005
34

Distributed assignment of cryptographic keys for access control in a hierarchy

Year:
1994
Language:
english
File:
PDF, 507 KB
english, 1994