[1] M. Abe and E. Fujisaki, “How to date blind signatures”, Lecture Notes in Computer Science, Vol. 1163, pp. 244-251, 1996.[2] B.B. Anderson, J.V. Hansen, P.B. Lowry and S.L. Summers, “Model checking for design and assurance of e-business processes”, Decision Support Systems, Vol. 39, No. 3, pp. 333-344, 2005.
[3] B.B. Anderson, J.V. Hansen, P.B. Lowry and S.L. Summers, “Model checking for e-business control and assurance”, IEEE Transactions on Systems, Man, and Cybernetics – Part C: Applications and Reviews, Vol. 35, No. 3, pp. 445-450, 2005.
[4] B.B. Anderson, J.V. Hansen, P.B. Lowry and S.L. Summers, “Standards and verification for fair-exchange and atomicity in e-commerce transactions”, Information Sciences, Vol. 176, No. 8, pp. 1045-1066, 2006.
[5] B.B. Anderson, J.V. Hansen, P.B. Lowry and S.L. Summers, “The application of model checking for securing e-commerce transactions”, Communications of the ACM, Vol. 49, No. 6, pp. 97-101, 2006.
[6] G. Arora, , M. Hanneghan and M. Merabti, “P2P commercial digital content exchange”, Electronic Commerce Research and Applications, Vol. 4, No. 3, pp. 250-263, 2005.
[7] F. Bao, R.H. Deng and W. Mao, “Efficient and practical fair exchange protocols with off-line TTP”, Proceedings of the IEEE Symposium on Security and Privacy, pp. 77-85, Oakland, California, USA, 1998.
[8] M. Ben-Or, O. Goldreich, S. Micali and R.L. Rivest, “A fair protocol for signing contracts”, IEEE Transactions on Information Theory, Vol. 36, No. 1, pp. 40-46, 1990.[9] D. Bolignano, “An approach to the formal verification of cryptographic protocols”, Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 106-118, New Delhi, India, 1996.
[10] D. Bolignano, “Towards the formal verification of electronic commerce protocols”, Proceedings of the 10th Computer Security Foundations Workshop, pp. 133-146, Rockport, MA, USA, 1997.
[11] T. Cao, D. Lin and R. Xue, “A randomized RSA-based partially blind signature scheme for electronic cash”, Computers & Security, Vol. 24, No. 1, pp. 44-49, 2005.[12] D. Chaum, “Untraceable electronic mail return addresses and digital pseudonyms”, Communications of the ACM, Vol. 24, No. 2, pp. 84-88, 1981.
[13] D. Chaum, “Blind Signature for Untraceable Payment”, Proceedings of Eurorypto’82, pp. 199-203, Plenum press, New York, 1983.
[14] D. Chaum, “Security without identification: transaction systems to make big brother obsolete”, Communications of the ACM, Vol. 24, No. 10, pp. 1030-1044, 1985.
[15] D. Chaum, A. Fiat and M. Naor, “Untraceable electronic cash”, Lecture Notes in Computer Science, Vol. 403, pp. 319-327, 1990.
[16] H.Y. Chien, J.K. Jan and Y.M. Tseng, “RSA-based partially blind signature with low computation”, Proceedings of the 8th International Conference on Parallel and Distributed Systems, pp. 385-389, Washington DC, USA, 2001.
[17] J.S. Coron, D. Naccache, J.P. Stern, “On the Security of RSA Padding”, Lecture Notes in Computer Science, Vol. 1666, pp. 1-18, 1999.
[18] B. Cox, J.D. Tygar and M. Sirbu, “Netbill security and transaction protocol”, Proceedings of the First USENIX Workshop on Electronic Commerce, pp. 77-88, New York, USA, 1995.
[19] R.H. Deng, L. Gong, A.A. Lazer and W. Wang, “Practical protocols for certified electronic mail”, Journal of Network and System Management, Vol. 4, No. 3, 279-297, 1996.
[20] P.D. Ezhilchevlvan and S.K. Shrivastava, “A family of trusted third party based fair-exchange protocols”, IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 4, pp. 273-286, 2005.
[21] C.I. Fan, W.K. Chen and Y.S. Yeh, “Randomization enhanced Chaum’s blind signature scheme”, Computer Communications, Vol. 23, No. 17, pp. 1677-1680, 2000.
[22] C.I. Fan, Y.K. Liang and B.W. Lin, “Fair transaction protocols based on electronic cash”, Proceedings of the 7th International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 383-388, Taipei, Taiwan, 2006.
[23] N. Ferguson, “Single term off-line coins”, Lecture Notes in Computer Science, Vol. 765, pp. 318-328, 1994.
[24] Formal Systems (Europe) Ltd, Failure Divergence Refinement - FDR2 User Manual, version 2.83 edition, 2007.
[25] F.C. Gartner, H. Pagnia and H. Vogt, “Approaching a formal definition of fairness in electronic commerce”, Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems, pp. 354-359, Lausanne, Switzerland, 1999.
[26] M.G. Gouda and A.X. Liu, “Formal specification and verification of a micropayment protocol”, Proceedings of the 13th International Conference on Computer Communications and Networks, pp. 489-494, Rosemont, Illinois, USA, 2004.
[27] J. Grau, “Online privacy and security: the fear factor”, available at: http://www.emarketer.com/report.aspx?code=privacy_retail_apr06, 2006.
[28] C.A. Hoare, Communicating Sequential Processes, Prentice-Hall, New Jersey, 1985.
[29] H. Henderson, Privacy in the Information Age, Facts on File Inc, New York, 2006.
[30] N. Heintze, J.D. Tygar, J. Wing and H.C. Wong, “Model checking electronic commerce protocols”, Proceedings of the 2nd USENIX Workshop on Electronic Commerce, pp. 146-164, Oakland, California, USA, 1996.
[31] M.S. Hwang, I.C. Lin and L.H. Li, “A simple micro-payment scheme”, Journal of Systems and Software, Vol. 55, No. 3, pp. 221-229, 2001.
[32] I. Khill, J. Kim, I. Han and J. Ryou, “Multi-party fair exchange protocol using ring architecture model”, Computers & Security, Vol. 20, No. 5, pp. 422-439, 2001.
[33] I.G. Kim and J.Y. Choi, “Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking”, Proceedings of the 18th International Conference on Advanced Information Networking and Application, pp. 264-269, Fukuoka, Japan, 2004.
[34] W. Kong, K. Ogata, J. Xiang and K. Futatsugi, “Formal analysis of an anonymous fair exchange e-commerce protocol”, Proceedings of the 4th International Conference on Computer and Information Technology, pp. 1100-1107, Wuhan, China, 2004.
[35] S. Kremer, O. Markowitch and J. Zhou, “An intensive survey of fair non-repudiation protocols”, Computer Communications, Vol. 25, No. 17, pp. 1606-1621, 2002.
[36] M.S. Kwon and Y.K. Cho, “Randomization enhanced blind signature scheme based on RSA”, IEICE Transactions on Fundamentals, Vol. E86-A, No. 3, pp. 730-733, 2003.
[37] D. Lekkas and D. Spinellis, “Implementing regular cash with blind fixed-value electronic coins”, Computer Standards & Interfaces, Vol. 29, No. 3, pp. 277-288, 2007.
[38] H. Li, W. Kou and X. Du, “Fair e-commerce protocols without a third party”, Proceedings of the 11th IEEE Symposium on Computers and Communications, pp. 324-327, Cagliari, Italy, 2006.
[39] X. Liang, Z. Cao, R. Lu and L. Qin, “Efficient and secure protocol in fair document exchange”, Computer Standards & Interfaces, Vol. 30, No. 3, pp. 167-176, 2008.
[40] P. Liu, P. Ning and S. Jajodia, “Avoiding loss of fairness owning to failures in fair data exchange systems”, Decision Support Systems, Vol. 31, No. 3, pp. 337-350, 2001.
[41] C. Ma, F. Lei and K. Chen, “Optimistic fair exchange e-commerce protocol based on secret sharing”, Journal of Systems Engineering and Electronics, Vol. 17, No. 4, pp. 858-863, 2006.
[42] A. Nenadic, N. Zhang, B. Cheetham and C. Goble, “RSA-based certified delivery of e-goods using verifiable and recoverable signature encryption”, Journal of Universal Computer Science, Vol. 11, No. 1, pp. 175-192, 2005.[43] C.C. Oniz, E. Savas and A. Levi, “An optimistic fair e-commerce protocol for large e-goods”, Proceedings of the 7th IEEE International Symposium on Computer Networks, pp. 214-219, Istanbul, Turkey, 2006.
[44] H. Pagnia, H. Vogt and F.C. Gartner, “Fair exchange”, The Computer Journal, Vol. 46, No. 1, pp. 55-75, 2003.[45] I. Ray and I. Ray, “Failure analysis of an e-commerce protocol using model checking”, Proceedings of the 2nd international Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS, 2000), pp. 176-183, Milpitas, California, USA, 2000.
[46] I. Ray, I. Ray and Z. Narasimhamurthi, “An optimistic fair-exchange e-commerce protocol with automated dispute resolution”, Lecture Notes in Computer Science, Vol. 1875, pp. 84-93, 2000.
[47] I. Ray, I. Ray and N. Natarajan, “An anonymous and failure resilient fair-exchange e-commerce protocol”, Decision Support Systems, Vol. 39, No. 3, pp. 267-292, 2005.
[48] I. Ray and H. Zhang, “Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components”, Electronic Commerce Research and Applications, doi:10.1016/j.elerap.2007.03.005, 2007.
[49] A. Roscoe, The Theory and Practice of Concurrency, Prentice-Hall, New Jersey, 1998.
[50] B. Schneier, Applied Cryptography, second edition, John Wiley & Sons, New York, 1996.
[51] H. Schuldt, A. Popovici and H-J. Schek, ”Execution guarantees in electronic commerce payments”, Lecture Notes in Computer Science, Vol. 1773, pp. 193-202, 2000.
[52] Q. Shi, N. Zhang and M. Merabti, “Signature-based approach to fair document exchange”, IEE Proceedings.-Communications, Vol. 150, No. 1, pp. 21-27, 2003.[53] D. Steves, C. Edmondson-Yurkanan and M. Gouda, “Properties of secure transaction protocols”, Computer Networks and ISDN Systems, Vol. 29, No. 15, pp. 1809-1821, 1997.
[54] R. Soltwisch, F. Tegeler and D. Hogrefe, “Formal specification and security verification of the IDKE protocol using FDR model checking”, Proceedings of the 7th IEEE Malaysia International Conference and 13th IEEE International Conference on Communication, pp. 329-334, Kuala Lumpur, Malaysia, 2005.
[55] M. Srivatsa, L. Xiong and L. Liu, “ExchangeGuard: A distributed protocol for electronic fair-exchange”, Proceedings of 19th IEEE International Parallel and Distributed Processing Symposium, pp. 105.2, Denver, Colorado, USA, 2005.
[56] J.D. Tygar, “Atomicity in electronic commerce”, Proceedings of the 15th Annual ACM Symposium on Principles of Distributed Computing, pp. 8-26, Philadelphia, Pennsylvania, USA, 1996.
[57] J.D. Tygar, “Atomicity and anonymity: distributed transactions for electronic commerce”, Proceedings of the 24th International Conference on Very Large Databases, pp. 1-12, Morgan Kaufmann Publishers Inc, San Francisco, California, USA, 1998.
[58] S.F. Tzeng, M.S. Hwang and H.B. Chen, “A secure on-line software transaction scheme”, Computer Standards & Interfaces, Vol. 27, No. 3, pp. 303-312, 2005.
[59] H. Vogt, H. Pagnia and F.C. Gartner, “Modular fair exchange protocols for electronic commerce”, Proceedings of 15th Annual Computer Security Applications Conference (ACSAC99), pp. 3-11, Phoenix, Arizona, USA, 1999.
[60] X. Wang, S.C. Cheung, and J. Wei, “A CSP and Z combined modeling of document exchange processes in e-commerce protocols”, Information and Software Technology, Vol. 44, No. 14, pp. 875-889, 2002.
[61] H. Wang, H. Guo, M. Lin, J. Yin, Q. He and J. Zhang, “A new dependable exchange protocol”, Computer Communications, Vol. 29, No. 15, pp. 2770-2780, 2006.
[62] W. Wang, Z. Hidvegi, A. Bailey and A. Whinston, “E-process design and assurance using model checking”, IEEE Computer, Vol. 33, No. 10, pp. 48-53, 2000.
[63] W. Wang, Z. Hidvegi, A.B. Bailey and A.D. Whinston, “Model Checking - a rigorous and efficient tool for e-commerce internal control and assurance”, Gozuita School Business, Emory University, Atlanta, Georgia, USA, 2001.
[64] X. Wang and X. Li, “Modeling and analysis of multi-party fair exchange protocols”, Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing 2007, pp. 2246-2250, Shanghai, China, 2007.
[65] J.M. Wing, “A symbiotic relationship between formal methods and security”, Proceedings of the Conference on Computer Security, Dependability and Assurance: From Needs to Solution, pp. 26-38, Washington DC, USA, 1998.
[66] Q. Zhang, K. Markantonakis and K. Mayes, “A practical fair-exchange e-payment protocol for anonymous purchase and physical delivery”, Proceedings of the 4th IEEE International Conference on Computer Systems and Applications, pp. 851-858, Dubai, UAE, 2006.
[67] Q. Zhang, K. Markantonakis and K. Mayes, “A mutual authentication enabled fair-exchange and anonymous e-payment protocol”, Proceedings of the 8th IEEE Conference on E-Commerce Technology and the 3rd IEEE Conference on Enterprise Computing, E-Commerce and E-Services, pp. 20-27, San Francisco, California, USA, 2006.
[68] N. Zhang, Q. Shi and M. Merabti, “Anonymous public-key certificates for anonymous and fair document exchange”, IEE Proceedings.-Communications, Vol. 147, No. 6, pp. 345-350, 2000.
[69] N. Zhang, Q. Shi and M. Merabti, “An efficient protocol for anonymous and fair document exchange”, Computer Networks, Vol. 41, No. 1, pp. 19-28, 2003.[70] N. Zhang, Q. Shi and M. Merabti, “A unified approach to a fair document exchange system”, The Journal of Systems and Software, Vol. 72, No. 1, pp. 83-96, 2004.[71] N. Zhang, Q. Shi, M. Merabti and R. Askwith, “Practical and efficient fair document exchange over networks”, Journal of Network and Computer Applications, Vol. 29, No. 1, pp. 46-61, 2006.[72] J. Zhou and D. Gollman, “A fair non-repudiation protocol”, Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 55-61, Oakland, California, USA, 1996.