Next: About this document
Up: Anonymous Atomic Transactions
Previous: Conclusion
References
- 1
-
Andrea J. Borr.
Transaction monitoring in Encompass: Reliable distributed
transaction processing.
In Proceedings of the Very Large Database Conference, pages
155-165, September 1981.
- 2
-
Stefan Brands.
An efficient off-line electronic cash system based on the
representation problem.
Technical Report CS-R9323, Centrum voor Wiskunde en Informatica,
1993.
- 3
-
E. Brickell, P. Gemmell, and D. Kravitz.
Trustee-based tracing extensions to anonymous cash and the making of
anonymous change.
In Proceedings of the Sixth Annual ACM-SIAM Symposium on
Discrete Algorithms, pages 457-466, 1995.
- 4
-
L. Jean Camp, Marvin Sirbu, and J. D. Tygar.
Token and notational money in electronic commerce.
In Proceedings of the First USENIX Workshop in Electronic
Commerce, pages 1-12, July 1995.
- 5
-
D. Chaum, A. Fiat, and M. Naor.
Untraceable electronic cash.
In Advances in Cryptology -- CRYPTO '88 Proceedings, pages
200-212. Springer-Verlag, 1990.
- 6
-
David Chaum.
Blind signatures for untraceable payments.
In Advances in Cryptology: Crypto '82 Proceedings, pages
188-293. Plenum Press, 1983.
- 7
-
David Chaum.
Security without identification: Transaction systems to make big
brother obsolete.
Communications of the ACM, 28(10):1030-1044, October 1985.
- 8
-
Benjamin Cox.
Maintaining prvacy in electronic transactions.
Technical Report TR 1994-9, Carnegie Mellon University Information
Networking Institute, Pittsburgh, PA, September 1994.
- 9
-
C. J. Date.
An Introduction to Database Systems Volume 2.
Addison-Wesley, Reading, MA, 1983.
- 10
-
J. Gray and A. Reuter.
Transaction Processing.
Morgan-Kauffman, 1993.
- 11
-
James N. Gray.
A transaction model.
Technical Report RJ2895, IBM Research Laboratory, San Jose,
California, August 1980.
- 12
-
James N. Gray.
The transaction concept: Virtues and limitations.
In Proceedings of the Very Large Database Conference, pages
144-154, September 1981.
- 13
-
Haber and Stornetta.
How to time-stamp a digital document.
Journal of Cryptology, 3(2), 1991.
- 14
-
M. Jakobsson.
Ripping coins for a fair exchange.
In Louis C. Guillou and Jean-Jacques Quisquater, editors,
Advances in Cryptology: Eurocrypt 95 Proceedings, volume 921 of Lecture
Notes in Computer Science. Springer-Verlag, 1995.
- 15
-
Steven Low, Nicholas F. Maxemchuk, and Sanjoy Paul.
Anonymous credit cards.
Technical report, AT&T Bell Laboratories, 1993.
Submitted to IEEE Symposium on Security and Privacy, 1993.
- 16
-
Bruce Schneier.
Applied Cryptography, 2nd edition.
John Wiley and Sons, 1996.
- 17
-
J. D. Tygar.
Atomicity in electronic commerce.
In Proceedings of the Fifteenth Annual ACM Symposium on
Principles of Distributed Computing, pages 8-26, May 1996.
- 18
-
Bennet S. Yee.
Using Secure Coprocessors.
PhD thesis, Carnegie Mellon University, 1994.
TOM Comversion
Fri Oct 4 18:57:08 EDT 1996