Analysis of a known offline e-coin system, International Journal of Computer Applications, 2014. ,
How to date blind signatures, Advances in Cryptology -ASIACRYPT '96 Proceedings, pp.244-251, 1996. ,
DOI : 10.1007/BFb0034851
Mobile values, new names, and secure communication, The 28th Symposium on Principles of Programming Languages, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, 2008. ,
DOI : 10.1109/CSF.2008.26
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001. ,
DOI : 10.1109/CSFW.2001.930138
Untraceable off-line cash in wallets with observers (extended abstract), Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology , CRYPTO '93, pp.302-318, 1994. ,
Untraceable Electronic Cash, Advances in Cryptology: Proceedings of CRYPTO '88, pp.319-327, 1990. ,
DOI : 10.1007/0-387-34799-2_25
Anonymity in Transferable E-cash, Applied Cryptography and Network Security, pp.207-223, 2008. ,
DOI : 10.1007/978-3-540-68914-0_13
URL : https://hal.archives-ouvertes.fr/hal-01110485
Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash, Financial Cryptography and Data Security, 12th International Conference, 2008. ,
DOI : 10.1007/978-3-540-85230-8_19
Blind Signatures for Untraceable Payments, Advances in Cryptology: Proceedings of CRYPTO '82, 1983. ,
DOI : 10.1007/978-1-4757-0602-4_18
A non-interactive electronic cash system, Algorithms and Complexity , Second Italian Conference, Italy, pp.109-124, 1994. ,
Estimations on the security aspect of brand's electronic cash scheme, 19th International Conference on Advanced Information Networking and Applications AINA, 2005. ,
Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals, Proceedings on Advances in Cryptology, pp.328-335 ,
DOI : 10.1007/0-387-34799-2_26
Methodology for digital money based on general cryptographic tools, Advances in Cryptology -EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Italy, 1994. ,
Formal Analysis of Electronic Exams, Proceedings of the 11th International Conference on Security and Cryptography, pp.101-112, 2014. ,
DOI : 10.5220/0005050901010112
URL : https://hal.archives-ouvertes.fr/hal-01337413
Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009. ,
DOI : 10.3233/JCS-2009-0340
A formal taxonomy of privacy in voting protocols, 2012 IEEE International Conference on Communications (ICC), pp.6710-6715, 2012. ,
DOI : 10.1109/ICC.2012.6364938
URL : https://hal.archives-ouvertes.fr/hal-01338064
Formal Verification of e-Auction Protocols, Principles of Security and Trust, POST, pp.247-266, 2013. ,
DOI : 10.1007/978-3-642-36830-1_13
URL : https://hal.archives-ouvertes.fr/hal-01338031
On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2, pp.198-208, 1983. ,
Single Term Off-Line Coins, Advances in Cryptology, Lecture Notes in Computer Science -EUROCRYPT '93, pp.318-328, 1994. ,
DOI : 10.1007/3-540-48285-7_28
User efficient recoverable off-line e-cash scheme with fast anonymity revoking, Mathematical and Computer Modelling, vol.58, issue.1-2, 2013. ,
DOI : 10.1016/j.mcm.2012.07.012
Making electronic refunds reusable, 2001. ,
Reducing protocol analysis with xor to the xor-free case in the horn theory based approach, Journal of Automated Reasoning, 2011. ,
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus, Applied Cryptography and Network Security, 5th International Conference, 2007. ,
DOI : 10.1007/978-3-540-72738-5_6
Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash, Proceedings on Advances in Cryptology , CRYPTO '89, pp.481-496, 1989. ,
DOI : 10.1007/0-387-34805-0_43
Improved cryptographic protocol for digital coin exchange, Soft Computing and Intelligent Systems (SCIS), pp.1148-1151, 2014. ,
How to Break Another ???Provably Secure??? Payment System, EU- ROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, France, pp.121-132, 1995. ,
DOI : 10.1007/3-540-49264-X_10
How to Break and Repair a ???Provably Secure??? Untraceable Payment System, CRYPTO '91, 11th Annual International Cryptology Conference, pp.338-350, 1991. ,
DOI : 10.1007/3-540-46766-1_28
Basic security of the ecash payment system, Applied Cryptography, Course on Computer Security and Industrial Cryptography, pp.201-231 ,
Formal analysis of secure e-cash transaction protocol, International Conference on Advances in Engineering and Technology ,