Torben P. Pedersen

According to our database1, Torben P. Pedersen authored at least 29 papers between 1988 and 2005.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2005
PKIX - Public Key Infrastructure (X.509).
Proceedings of the Encyclopedia of Cryptography and Security, 2005

PEM, Privacy Enhanced Mail.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

HTTPS, Secure HTTPS.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

CPS, Certificate Practice Statement.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

2002
IS Innovation: Adoption of B2B eCommerce.
Proceedings of the Towards The Knowledge Society: eCommerce, 2002

1998
Statistical Secrecy and Multibit Commitments.
IEEE Trans. Inf. Theory, 1998

Zero-Knowledge Authentication Scheme with Secret Key Exchange.
J. Cryptol., 1998

WYSIWYS? - What you see is what you sign?
Inf. Secur. Tech. Rep., 1998

Signing Contracts and Paying Electronically.
Proceedings of the Lectures on Data Security, 1998

1997
Fail-Stop Signatures.
SIAM J. Comput., 1997

On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures.
J. Cryptol., 1997

1996
Electronic Payments of Small Amounts.
Proceedings of the Security Protocols, 1996

Efficient and Provable Security Amplifications.
Proceedings of the Security Protocols, 1996

On the Difficulty of Software Key Escrow.
Proceedings of the Advances in Cryptology, 1996

New Convertible Undeniable Signature Schemes.
Proceedings of the Advances in Cryptology, 1996

1995
On the Efficiency of Group Signatures Providing Information-Theoretic Anonymity.
Proceedings of the Advances in Cryptology, 1995

1994
New Group Signature Schemes (Extended Abstract).
Proceedings of the Advances in Cryptology, 1994

Parallel Divertibility of Proofs of Knowledge (Extended Abstract).
Proceedings of the Advances in Cryptology, 1994


1993
Improved Privacy in Wallets with Observers (Extended Abstract).
Proceedings of the Advances in Cryptology, 1993

1992
How to Make Efficient Fail-stop Signatures.
Proceedings of the Advances in Cryptology, 1992

Transferred Cash Grows in Size.
Proceedings of the Advances in Cryptology, 1992

New Constructions of Fail-Stop Signatures and Lower Bounds (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992

Wallet Databases with Observers.
Proceedings of the Advances in Cryptology, 1992

1991
A Threshold Cryptosystem without a Trusted Party (Extended Abstract).
Proceedings of the Advances in Cryptology, 1991

Distributed Provers with Applications to Undeniable Signatures.
Proceedings of the Advances in Cryptology, 1991

Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing.
Proceedings of the Advances in Cryptology, 1991

1990
Convertible Undeniable Signatures.
Proceedings of the Advances in Cryptology, 1990

1988
Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract).
Proceedings of the Advances in Cryptology, 1988


  Loading...