We present a new cryptographic primitive, the <i>blinded-key signature,</i> which allows the inclusion of private keys in autonomous mobile agents. This novel approach can be applied to many well-known digital signature schemes, such as RSA and ElGammal.
This paper presents a scheme for the design, analysis and comparison of electronic payment systems. Three systems are described in detail through this scheme. Keywords: payment systems, analysis and design of payment systems.
This paper describes two architectures for building Pay-per-Run software systems. These are systems that allow the user to pay for each execution of an application, instead of buying a more expensive user license. This is a new model for software distribution, in which developers charge small fees for each execution in order to increase their user market.… (More)
The aim of this paper is to evaluate, through indexing techniques, the performance of Neo4j and OrientDB, both graph databases technologies and to come up with strength and weaknesses os each technology as a candidate for a storage mechanism of a graph structure. An index is a data structure that makes the searching faster for a specific node in concern of… (More)
Parasitic authentication [Ebringer et al., 2000] is a novel approach for user authentication in electronic wallet systems which combines security and usability. We propose an extension to parasitic authentication that integrates it to payment protocols thus increasing the security of electronic wallets. The additional security comes at the expense of… (More)