共 50 条
- [2] The design and analysis of an electronic evidence and non-repudiation protocol [J]. ISADS 2005: International Symposium on Autonomous Decentralized Systems,Proceedings, 2005, : 570 - 573
- [4] An efficient non-repudiation protocol [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 126 - 132
- [5] A fair non-repudiation protocol [J]. PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON CSCW IN DESIGN, 2002, : 68 - 73
- [6] Establishing chain of evidence as a base for non-repudiation services [J]. SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 49 - 60
- [7] Non-repudiation Analysis with LYSA [J]. EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST, 2009, 297 : 318 - 329
- [9] Intermediary non-repudiation protocols [J]. IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE, 2003, : 207 - 214
- [10] Non-repudiation and the metaphysics of presence [J]. SECURITY PROTOCOLS, 2007, 4631 : 204 - 206