共 50 条
- [31] A key authentication scheme with non-repudiation [J]. Operating Systems Review (ACM), 2004, 38 (03): : 75 - 78
- [33] Anonymous fingerprinting with direct non-repudiation [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 401 - 414
- [34] Non-repudiation protocols for multiple entities [J]. COMPUTER COMMUNICATIONS, 2004, 27 (16) : 1608 - 1616
- [35] Non-repudiation oblivious watermarking schema for secure digital video distribution [J]. PROCEEDINGS OF THE 2002 IEEE WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 2002, : 343 - 346
- [36] Signcryption with Non-interactive Non-repudiation [J]. Designs, Codes and Cryptography, 2005, 37 : 81 - 109
- [38] Optimistic non-repudiation protocol analysis [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 90 - +
- [40] Formal analysis of a non-repudiation protocol [J]. 11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 54 - 65