A fair non-repudiation protocol

被引:207
|
作者
Zhou, JY [1 ]
Gollmann, D [1 ]
机构
[1] UNIV LONDON,ROYAL HOLLOWAY & BEDFORD NEW COLL,DEPT COMP SCI,EGHAM TW20 0EX,SURREY,ENGLAND
关键词
D O I
10.1109/SECPRI.1996.502669
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:55 / 61
页数:7
相关论文
共 50 条
  • [21] Automatic Analysis of a Non-Repudiation Protocol
    Lanotte, Ruggero
    Maggiolo-Schettini, Andrea
    Troina, Angelo
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 : 113 - 129
  • [22] A mutual non-repudiation protocol with privacy
    Jiang Xiao-ning
    Ye Cheng-qing
    [J]. Journal of Zhejiang University-SCIENCE A, 2000, 1 (3): : 317 - 321
  • [23] A non-repudiation fair exchange protocol with semi-trusted third party
    [J]. 2001, Huazhong University of Science and Technology (29):
  • [24] Optimistic non-repudiation protocol analysis
    Santiago, Judson
    Vigneron, Laurent
    [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 90 - +
  • [25] A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY
    蒋晓宁
    叶澄清
    [J]. Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2000, (03) : 80 - 84
  • [26] Formal analysis of a non-repudiation protocol
    Schneider, S
    [J]. 11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 54 - 65
  • [27] Formal analysis of non-repudiation protocol by spi
    Li, Yuan
    Jiang, Jian-Guo
    Wang, Huan-Bao
    [J]. Tongxin Xuebao/Journal on Communications, 2009, 30 (05): : 94 - 98
  • [28] A kind of analysis method of off-line TTP fair non-repudiation protocol
    Liu, Dongmei
    Qing, Sihan
    Ma, Hengtai
    Li, Shuren
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011, 48 (04): : 656 - 665
  • [29] A multi-party non-repudiation protocol
    Kremer, S
    Markowitch, O
    [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 271 - 280
  • [30] Fair multi-party non-repudiation protocols
    Steve Kremer
    Olivier Markowitch
    [J]. International Journal of Information Security, 2003, 1 (4) : 223 - 235