scispace - formally typeset
Journal ArticleDOI

Transaction protection by “antennas”

Sead Muftic
- 01 Apr 1990 - 
- Vol. 9, Iss: 3, pp 245-255
Reads0
Chats0
TLDR
Modifications of Rabin's protocols are suggested, so that new versions of protocols may be used to implement the same security services, but with better operational efficiency.
About
This article is published in Computers & Security.The article was published on 1990-04-01. It has received 3 citations till now. The article focuses on the topics: Trusted third party & Cryptographic protocol.

read more

Citations
More filters
Patent

Method for managing access to protected computer resources

TL;DR: In this article, a system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes clearinghouse means for storing identity data of the first server computers and the client computers, server software means and client software adapted to forward its identity data and identity data from the client computer(s) to the clearinghouse at the beginning of an operating session, and a hardware key connected to the computer, the key being adapted to generate a digital identification as part of the identity data.
Journal ArticleDOI

Implementation of the Comprehensive Integrated Security System for computer networks

TL;DR: The concept, implementation, and some specific applications of various versions of the CISS system are described, which may be combined in a number of different variations to provide a specific version of the network security system.
References
More filters
Book ChapterDOI

How to prove yourself: practical solutions to identification and signature problems

TL;DR: Simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys are described.
Journal ArticleDOI

A randomized protocol for signing contracts

TL;DR: The 1-out-of-2 oblivious transfer as discussed by the authors allows one party to transfer exactly one secret, out of two recognizable secrets, to his counterpart, while the sender is ignorant of which secret has been received.
Proceedings Article

A Randomized Protocol for Signing Contracts.

TL;DR: Randomized protocols for signing contracts, certified mail, and flipping a coin are presented and an implementation of the 1-out-of-2 oblivious transfer, using any public key cryptosystem, is presented.
Journal ArticleDOI

How to exchange (secret) keys

TL;DR: A protocol is presented whereby two adversaries may exchange secrets, although neither trusts the other, and it is shown how each of the two can prove, for each bit delivered, that the bit is good.
Journal ArticleDOI

Transaction protection by beacons

TL;DR: Protocols for implementing contract signing, confidential disclosures, and certified mail in an electronic mail system are proposed, which can be implemented with just a small probability of a participant cheating his partner, by use of a beacon emitting random integers.
Related Papers (5)