Back to Results
First PageMeta Content
Computing / Internet / Information / Challenge-response authentication / Internet Relay Chat / Vehicle Identification Number


Conditional Purchase Orders John Kelsey3 Abstract We propose a system of commerce based on the Conditional
Add to Reading List

Document Date: 2014-03-02 23:18:30


Open Document

File Size: 148,81 KB

Share Result on Facebook

City

ArbiterID|Unique / ServerID|Unique / /

Company

ACM Press / Pam / CommerceNet / New York Stock Exchange / RSA Laboratories / CitiBank / John Wiley & Sons / Counterpane Systems / /

Country

Cuba / United States / /

/

Event

Reorganization / FDA Phase / /

Facility

National Institute of Standards and Technology / NBS FIPS PUB / NIST FIPS PUB / /

IndustryTerm

symmetric encryption algorithm / symmetric message authentication algorithm / advertising costs / online checking / classic commerce systems / Buyer-driven systems / exchange-driven systems / real time / Internet Commerce System Optimized / given buyer / communications networks / eventual seller / above protocol / erent protocols / public server / message-processing software / commerce systems / e - commerce / potential seller / cryptographic solution / challenge-response protocol / erent payment systems / erent buyer/seller protocols / computerized reservations systems / electronic commerce / /

Organization

Columbia Univ. / U.S. Department of Commerce / USENIX Association / National Institute of Standards and Technology / National Bureau of Standards / /

Person

Bruce Schneiery / Jay Walker / James Jorasch / Chris Hall / /

/

Position

nal Arbiter / currently common model of buyer-driven commerce / Arbiter / single Arbiter / /

Product

Franklin / X3 / Bidding / /

ProvinceOrState

Minnesota / /

PublishedMedium

Communications of the ACM / /

Technology

challenge-response protocol / symmetric encryption algorithm / CPO protocol / 3.1 Players These protocols / above protocol / Peer-to-Peer / erent buyer/seller protocols / private key / secret key / erent protocols / encryption / symmetric message authentication algorithm / cryptography / 3 Protocols / public key / binding protocol / public-key encryption / posting protocol / browsing protocol / /

SocialTag