共 50 条
- [22] Non-repudiation Analysis with LYSA [J]. EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST, 2009, 297 : 318 - 329
- [23] Intermediary non-repudiation protocols [J]. IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE, 2003, : 207 - 214
- [24] Non-repudiation and the metaphysics of presence [J]. SECURITY PROTOCOLS, 2007, 4631 : 204 - 206
- [25] Non-repudiation in internet telephony [J]. NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 361 - +
- [26] Investigation of non-repudiation protocols [J]. INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 38 - 47
- [27] A fair non-repudiation protocol [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 55 - 61
- [29] Non-repudiation and the metaphysics of presence [J]. SECURITY PROTOCOLS, 2007, 4631 : 207 - 214