|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 67 occurrences of 51 keywords
|
|
|
Results
Found 45 publication records. Showing 45 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
217 | Jose Antonio Onieva, Jianying Zhou 0001, Javier López 0001 |
Multiparty nonrepudiation: A survey. |
ACM Comput. Surv. |
2008 |
DBLP DOI BibTeX RDF |
Multiparty applications, nonrepudiation, multiparty protocols |
76 | Yumin Yuan |
A Threshold Proxy Signature Scheme with Nonrepudiation and Anonymity. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
threshold proxy signature, anonymity, Digital signature, proxy signature, nonrepudiation |
46 | Giampaolo Bella, Lawrence C. Paulson |
Accountability protocols: Formalized and verified. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
inductive method, proof tools, Isabelle, Nonrepudiation, certified email |
46 | Jorge Dávila, Javier López 0001, Antonio Mana, Juan J. Ortega, José M. Troya |
Development of Secure Internet Applications for Governmental Environments. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
secure Internet applications, governmental environments, public administrative procedures, economic benefits, citizen satisfaction, Project Alcance, Spanish R&D Programme, private transport companies, Andalucia regional government, Internet, authenticity, confidentiality, public administration, nonrepudiation |
40 | Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi |
Secure E-Commerce Transactions for Multicast Services. |
CEC/EEE |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Asad Ullah Khan, Nadeem Javaid, Muhammad Asghar Khan, Insaf Ullah |
A blockchain scheme for authentication, data sharing and nonrepudiation to secure internet of wireless sensor things. |
Clust. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Tuan-Vinh Le, Chien-Lung Hsu, Wei-Xin Chen |
A Hybrid Blockchain-Based Log Management Scheme With Nonrepudiation for Smart Grids. |
IEEE Trans. Ind. Informatics |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Guruprakash Jayabalasamy, Srinivas Koppu |
High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem. |
J. King Saud Univ. Comput. Inf. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Chin-Ling Chen, Tsai-Tung Yang, Yong-Yuan Deng, Chi-Hua Chen |
A secure Internet of Things medical information sharing and emergency notification system based on nonrepudiation mechanism. |
Trans. Emerg. Telecommun. Technol. |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Yang Xu 0013, Ju Ren 0001, Guojun Wang 0001, Cheng Zhang, Jidian Yang, Yaoxue Zhang |
A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT. |
IEEE Trans. Ind. Informatics |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Gwan-Hwan Hwang, Wei-Sian Huang, Jenn-Zjone Peng, Yu-Wei Lin |
Fulfilling mutual nonrepudiation for cloud storage. |
Concurr. Comput. Pract. Exp. |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Muqeet Ali, Rezwana Reaz, Mohamed G. Gouda |
Nonrepudiation Protocols Without a Trusted Party. |
NETYS |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Gang Yu, Zhenfu Cao, Guang Zeng, Wenbao Han |
Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation. |
ProvSec |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Muqeet Ali, Rezwana Reaz, Mohamed G. Gouda |
Two-phase Nonrepudiation Protocols. |
ICCCNT |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Muqeet Ali, Mohamed G. Gouda |
Nonrepudiation Protocols in Cloud Systems. |
ICCCNT |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Gwan-Hwan Hwang, Jenn-Zjone Peng, Wei-Sian Huang |
A Mutual Nonrepudiation Protocol for Cloud Storage with Interchangeable Accesses of a Single Account from Multiple Devices. |
TrustCom/ISPA/IUCC |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Jason King |
Measuring the forensic-ability of audit logs for nonrepudiation. |
ICSE |
2013 |
DBLP DOI BibTeX RDF |
|
29 | |
Nonrepudiation Protocol. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Mike Just |
Nonrepudiation of Digital Signatures. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Panagiota Lagou, Gregory Chondrokoukis |
Choosing a Biometric for Nonrepudiation. |
Inf. Secur. J. A Glob. Perspect. |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Panagiota Lagou, Gregory Chondrokoukis |
Survey on Nonrepudiation: Digital Signature Versus Biometrics. |
Inf. Secur. J. A Glob. Perspect. |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Starsky H. Y. Wong, Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability. |
Security and Management |
2009 |
DBLP BibTeX RDF |
|
29 | Ana Isabel González-Tablas Ferreres, A. Orfila Ramos, Arturo Ribagorda |
EVAWEB V2: Enhancing a Web-Based Assessment Systems Focused on Nonrepudiation Use and Teaching. |
Int. J. Web Based Learn. Teach. Technol. |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Ayman Haggag, Mohamed Ghoneim, Jianming Lu, Takashi Yahagi |
Scalable Authentication and Nonrepudiation Technique for JPEG 2000 Images Using JPSEC Protection Tools. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Randy Sabett |
Nonrepudiation. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Chien-Lung Hsu, Tzong-Sun Wu |
Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability. |
Appl. Math. Comput. |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Jianying Zhou 0001 |
Achieving Fair Nonrepudiation in Electronic Transactions. |
J. Organ. Comput. Electron. Commer. |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Hung-Yu Lin, Lein Harn |
Authentication protocols with nonrepudiation services in personal communication systems. |
IEEE Commun. Lett. |
1999 |
DBLP DOI BibTeX RDF |
|
26 | Kwei-Jay Lin, Joe Zou, Yan Wang 0002 |
Accountability Computing for E-society. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
service accountability, security, quality of service, service-oriented architecture, trust, disclosure, liability, nonrepudiation |
26 | Bob Blakley 0001, G. R. Blakley |
All sail, no anchor II: Acceptable high-end PKI. |
Int. J. Inf. Sec. |
2004 |
DBLP DOI BibTeX RDF |
Digital signature, Signature, PKI, Law, RSA cryptosystem, Nonrepudiation |
26 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
26 | Jianying Zhou 0001, Dieter Gollmann |
A Fair Non-repudiation Protocol. |
S&P |
1996 |
DBLP DOI BibTeX RDF |
fair nonrepudiation protocol, message sender, message receiver, cryptography, protocols, formal verification, formal verification, encryption, trusted third party |
20 | A. Selcuk Uluagac, Christopher P. Lee 0001, Raheem A. Beyah, John A. Copeland |
Designing Secure Protocols for Wireless Sensor Networks. |
WASA |
2008 |
DBLP DOI BibTeX RDF |
Security in Wireless Sensor Networks, Security Services for Wireless Sensor Networks, Wireless Sensor Networks |
20 | Gwan-Hwan Hwang, Yu-Hsuan Chang, Tao-Ku Chang |
An Operational Model and Language Support for Securing Web Services. |
ICWS |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Ki-Woong Park, Hyunchul Seok, Kyu Ho Park |
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices. |
AINA Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Gianluigi Me, Maurizio Adriano Strangio, Alexander Schuster |
Mobile Local Macropayments: Security and Prototyping. |
IEEE Pervasive Comput. |
2006 |
DBLP DOI BibTeX RDF |
personal trusted device, ECIES, security, Java, handheld, payment |
20 | Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold |
Secure Internet Banking Authentication. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
short-time passwords, short-lived passwords, taxonomy of attacks, authentication, Internet banking, public-key certificates |
20 | Peter Gutmann, David Naccache, Charles C. Palmer |
When Hashes Collide. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
cryptography, hashes, scripts |
20 | M. Bilal, Johnson P. Thomas, Mathews Thomas, Subil Abraham |
Fair BPEL Processes Transaction using Non-Repudiation Protocols. |
IEEE SCC |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Carlo Blundo, Stelvio Cimato |
A Software Infrastructure for Authenticated Web Metering. |
Computer |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah |
A2cast: an adaptive source authentication protocol for multicast streams. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Omaima Bamasak, Ning Zhang 0001 |
A secure proxy signature protocol for agent-based M-commerce applications. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Hassen Saïdi, Victoria Stavridou, Bruno Dutertre |
Protocol Codesign. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Sung-Cheal Byun, Byung-Ha Ahn |
Symmetric and Asymmetric Cryptography Based Watermarking Scheme for Secure Electronic Commerce via the Internet. |
Human.Society@Internet 2003 |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Ross J. Anderson, Michael Roe |
The GCHQ Protocol and Its Problems. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #45 of 45 (100 per page; Change: )
|
|