| 













 | |  | |  |
Open Problems in Electronic Commerce
Note: Links lead to the DBLP on the Web.
J. D. Tygar
17
J. D. Tygar: Open Problems in Electronic Commerce.
PODS 1999
: 101
16
J. D. Tygar: Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce.
VLDB 1998
: 1-12
15
J. D. Tygar: Limits of Microtransaction Systems.
NGITS 1997
: 0-
14
J. D. Tygar,
Bennet S. Yee
,
Nevin Heintze
: Cryptographic Postage Indicia.
ASIAN 1996
: 378-391
13
J. D. Tygar: Atomicity in Electronic Commerce.
PODC 1996
: 8-26
12
Nevin Heintze
, J. D. Tygar: A Model for Secure Protocols and Their Compositions.
TSE 22
(1): 16-30 (1996)
11
Marvin Sirbu
, J. D. Tygar: NetBill: An Internet Commerce System Optimized for Network Delivered Services.
COMPCON 1995
: 20-25
10
Sean W. Smith
,
David B. Johnson
, J. D. Tygar: Completely Asynchronous Optimistic Recovery with Minimal Rollbacks.
FTCS 1995
: 361-370
9
Chris Clifton
,
Peter Gemmel
,
Ed Means
,
Matt J. Merges
, J. D. Tygar: How are We Going to Pay for This? Fee-for-Service in Distributed Systems: Research and Policy Issues (Panel).
ICDCS 1995
: 344-348
8
Allan Heydon
, J. D. Tygar: Specifying and Checking UNIX Security Constraints.
Computing Systems 7
(1): 91-112 (1994)
7
John H. Reif
, J. D. Tygar,
Akitoshi Yoshida
: The Computability and Complexity of Optical Beam Tracing.
FOCS 1990
: 106-114
6
Allan Heydon
,
Mark W. Maimone
, J. D. Tygar,
Jeannette M. Wing
,
Amy Moormann Zaremski
: Miró: Visual Specification of Security.
TSE 16
(10): 1185-1197 (1990)
5
Michael O. Rabin
, J. D. Tygar: ITOSS: An Integrated Toolkit For Operating System Security.
FODO 1989
: 2-15
4
Allan Heydon
,
Mark W. Maimone
, J. D. Tygar,
Jeannette M. Wing
,
Amy Moormann Zaremski
: Constraining Pictures with Pictures.
IFIP 1989
: 157-162
3
John H. Reif
, J. D. Tygar: Efficient Parallel Pseudorandom Number Generation.
SIAM J. Comput. 17
(2): 404-411 (1988)
2
Maurice Herlihy
, J. D. Tygar: How to Make Replicated Data Secure.
CRYPTO 1987
: 379-391
1
John H. Reif
, J. D. Tygar: Efficient Parallel Pseudo-Random Number Generation.
CRYPTO 1985
: 433-446
Copyright(C) 2000 ACM | | | | | | |