[go: up one dir, main page]

Fan et al., 1997 - Google Patents

Secure rewarding schemes

Fan et al., 1997

View PDF
Document ID
6441704897589830795
Author
Fan C
Lei C
Publication year
Publication venue
Proceedings of the Thirtieth Hawaii International Conference on System Sciences

External Links

Snippet

Proposes a secure rewarding scheme in which a reward provider publishes a problem and provides a reward for a person who can supply him a satisfactory solution to the problem. The first qualified claimant with a satisfactory solution to the problem is selected to obtain the …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Bao et al. Efficient and practical fair exchange protocols with off-line TTP
Hwang et al. A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
Kilian et al. Identity escrow
US6154841A (en) Digital signature method and communication system
Golle et al. Universal re-encryption for mixnets
Asokan et al. Server-supported signatures
US5481613A (en) Computer network cryptographic key distribution system
US6377688B1 (en) Cryptographic communication method and system
US6708893B2 (en) Multiple-use smart card with security features and method
Ateniese et al. TRICERT: A Distributed Certified E-Mail Scheme.
Omote et al. A practical English auction with one-time registration
EP0950302A1 (en) Public key cryptographic apparatus and method
JPH07288517A (en) Cryptographic communication system and cryptographic communication method
Sun et al. Secure e-mail protocols providing perfect forward secrecy
US20040073790A1 (en) Intermediated delivery scheme for asymmetric fair exchange of electronic items
Kim et al. Improving fairness and privacy of Zhou-Gollmann's fair non-repudiation protocol
Onieva et al. Non-repudiation protocols for multiple entities
Song et al. How to make e-cash with non-repudiation and anonymity
Fan et al. Secure rewarding schemes
Zhou Achieving fair nonrepudiation in electronic transactions
Juang A practical anonymous payment scheme for electronic commerce
Zheng Signcryption or how to achieve cost (signature & encryption)<< cost (signature)+ cost (encryption)
Fan et al. Anonymous fair transaction protocols based on electronic cash
Witzke et al. Key management for large scale end-to-end encryption
Klonowski et al. Conditional digital signatures