next up previous
Next: About this document Up: Anonymous Atomic Transactions Previous: Conclusion

References

1
Andrea J. Borr. Transaction monitoring in Encompass: Reliable distributed transaction processing. In Proceedings of the Very Large Database Conference, pages 155-165, September 1981.

2
Stefan Brands. An efficient off-line electronic cash system based on the representation problem. Technical Report CS-R9323, Centrum voor Wiskunde en Informatica, 1993.

3
E. Brickell, P. Gemmell, and D. Kravitz. Trustee-based tracing extensions to anonymous cash and the making of anonymous change. In Proceedings of the Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 457-466, 1995.

4
L. Jean Camp, Marvin Sirbu, and J. D. Tygar. Token and notational money in electronic commerce. In Proceedings of the First USENIX Workshop in Electronic Commerce, pages 1-12, July 1995.

5
D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In Advances in Cryptology -- CRYPTO '88 Proceedings, pages 200-212. Springer-Verlag, 1990.

6
David Chaum. Blind signatures for untraceable payments. In Advances in Cryptology: Crypto '82 Proceedings, pages 188-293. Plenum Press, 1983.

7
David Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, October 1985.

8
Benjamin Cox. Maintaining prvacy in electronic transactions. Technical Report TR 1994-9, Carnegie Mellon University Information Networking Institute, Pittsburgh, PA, September 1994.

9
C. J. Date. An Introduction to Database Systems Volume 2. Addison-Wesley, Reading, MA, 1983.

10
J. Gray and A. Reuter. Transaction Processing. Morgan-Kauffman, 1993.

11
James N. Gray. A transaction model. Technical Report RJ2895, IBM Research Laboratory, San Jose, California, August 1980.

12
James N. Gray. The transaction concept: Virtues and limitations. In Proceedings of the Very Large Database Conference, pages 144-154, September 1981.

13
Haber and Stornetta. How to time-stamp a digital document. Journal of Cryptology, 3(2), 1991.

14
M. Jakobsson. Ripping coins for a fair exchange. In Louis C. Guillou and Jean-Jacques Quisquater, editors, Advances in Cryptology: Eurocrypt 95 Proceedings, volume 921 of Lecture Notes in Computer Science. Springer-Verlag, 1995.

15
Steven Low, Nicholas F. Maxemchuk, and Sanjoy Paul. Anonymous credit cards. Technical report, AT&T Bell Laboratories, 1993. Submitted to IEEE Symposium on Security and Privacy, 1993.

16
Bruce Schneier. Applied Cryptography, 2nd edition. John Wiley and Sons, 1996.

17
J. D. Tygar. Atomicity in electronic commerce. In Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, pages 8-26, May 1996.

18
Bennet S. Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, 1994.



TOM Comversion
Fri Oct 4 18:57:08 EDT 1996