|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 398 occurrences of 211 keywords
|
|
|
Results
Found 435 publication records. Showing 435 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
135 | Michael Wichert, David B. Ingham, Steve J. Caughey |
Non-repudiation Evidence Generation for CORBA using XML. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
Security, XML, e-commerce, CORBA, non-repudiation |
111 | Jianying Zhou 0001, Robert H. Deng, Feng Bao 0001 |
Evolution of Fair Non-repudiation with TTP. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
fair non-repudiation, trusted third party, secure electronic commerce |
98 | Lu Bai, Chunhe Xia, Xiaojian Li, Haiquan Wang |
A Bulk Email Oriented Multi-party Non-repudiation Exchange Protocol. |
WISM |
2009 |
DBLP DOI BibTeX RDF |
SVO logic, bulk email, protocol, fairness, Encryption, non-repudiation |
98 | Eun-Jun Yoon, Kee-Young Yoo |
Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. |
ICIC (3) |
2007 |
DBLP DOI BibTeX RDF |
Public key substitution attack, Cryptanalysis, Non-repudiation, Key authentication |
98 | Sigrid Gürgens, Carsten Rudolph, Holger Vogt |
On the security of fair non-repudiation protocols. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Fair non-repudiation, Security protocols, Protocol analysis, Protocol design |
98 | Jianying Zhou 0001, Dieter Gollmann |
An Efficient Non-repudiation Protocol . |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
network security, security protocols, non-repudiation |
98 | Jianying Zhou 0001, Dieter Gollmann |
Observations on Non-repudiation. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
non-repudiation, communications security, ISO standards |
90 | John Malone-Lee |
Signcryption with Non-interactive Non-repudiation. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
provable security, non-repudiation, Signcryption |
86 | Francis Klay, Laurent Vigneron |
Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder. |
Formal Aspects in Security and Trust |
2008 |
DBLP DOI BibTeX RDF |
AVISPA Tool, authentication, fairness, Cryptographic protocols, non-repudiation, automatic analysis |
86 | Jose Antonio Onieva, Javier López 0001, Rodrigo Roman, Jianying Zhou 0001, Stefanos Gritzalis |
Integration of non-repudiation services in mobile DRM scenarios. |
Telecommun. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Mobile applications, Digital rights management, Non-repudiation, Secure electronic commerce |
86 | Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee |
A key authentication scheme with non-repudiation. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
non-repudiation security, authentication, certificate, discrete logarithm, public key |
86 | Sungwoo Tak, Eun Kyo Park |
A Software Framework for Non-Repudiation Service based on Adaptive Secure Methodology in Electronic Commerce. |
Inf. Syst. Frontiers |
2004 |
DBLP DOI BibTeX RDF |
security software framework, electronic commerce (e-commerce), adaptive secure methodology, non-repudiation |
85 | C.-C. Liew, Wee Keong Ng, Ee-Peng Lim, B.-S. Tan, Kok-Leong Ong |
Non-Repudiation in an Agent-Based Electronic Commerce System. |
DEXA Workshops |
1999 |
DBLP DOI BibTeX RDF |
|
75 | Tom Coffey, Puneet Saidha, Peter Burrows |
Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt. |
ISICT |
2003 |
DBLP DOI BibTeX RDF |
cryptographic protocol verification, logical postulates, proof of origin, proof of receipt, logics, security protocols, public-key cryptography, non-repudiation, deductive reasoning |
74 | Chung-Ming Ou, Chung-Ren Ou |
Adaptation of proxy certificates to non-repudiation protocol of agent-based mobile payment systems. |
Appl. Intell. |
2009 |
DBLP DOI BibTeX RDF |
Mobile agent, PKI, Non-repudiation, Mobile payment, Proxy certificate |
74 | Michael Conrad |
Non-repudiation mechanisms for peer-to-peer networks: enabling technology for peer-to-peer economic markets. |
CoNEXT |
2006 |
DBLP DOI BibTeX RDF |
proof of reception, peer-to-peer networks, non-repudiation |
74 | Sigrid Gürgens, Carsten Rudolph |
Security analysis of efficient (Un-)fair non-repudiation protocols. |
Formal Aspects Comput. |
2005 |
DBLP DOI BibTeX RDF |
Asynchronous product automata, Fairness, Non-repudiation, Protocol analysis |
74 | Steve Kremer, Olivier Markowitch |
Fair multi-party non-repudiation protocols. |
Int. J. Inf. Sec. |
2003 |
DBLP DOI BibTeX RDF |
Group communications, Non-repudiation, Fair exchange |
73 | Sigrid Gürgens, Carsten Rudolph, Holger Vogt |
On the Security of Fair Non-repudiation Protocols. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
73 | Olivier Markowitch, Steve Kremer |
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
73 | Olivier Markowitch, Steve Kremer |
A Multi-party Optimistic Non-repudiation Protocol. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
71 | Omaima Bamasak, Ning Zhang 0001 |
A secure method for signature delegation to mobile agents. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
signature delegation, non-repudiation, mobile agent security |
62 | Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng |
Minimizing TTP's involvement in signature validation. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Validity of evidence, Digital signature, Non-repudiation |
61 | Simon E. Parkin, David B. Ingham, Graham Morgan |
A Message Oriented Middleware Solution Enabling Non-repudiation Evidence Generation for Reliable Web Services. |
ISAS |
2007 |
DBLP DOI BibTeX RDF |
Web Services, Middleware, Non-repudiation, MOM |
61 | Kwangjo Kim, Sangjoon Park, Joonsang Baek |
Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
Fairness, Cryptographic Protocol, Non-repudiation, Trusted Third Party |
61 | Jerrold F. Stach, Eun Kyo Park |
Analysis of a Non Repudiation Authentication Protocol for Personal Communication Systems. |
ICCCN |
1998 |
DBLP DOI BibTeX RDF |
Personal Communications System (PCS), Non-repudiation of services, traffic analysis, one way function |
60 | Guoqiang Li 0001, Mizuhito Ogawa |
On-the-Fly Model Checking of Fair Non-repudiation Protocols. |
ATVA |
2007 |
DBLP DOI BibTeX RDF |
|
56 | Hossein Ghodosi, Josef Pieprzyk |
Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
Cryptography, Digital Signatures, Proxy Signatures, ElGamal signatures |
51 | Tawfiq S. M. Barhoom, Shen-sheng Zhang |
Trusted Exam Marks System at IUG Using XML-Signature. |
CIT |
2004 |
DBLP DOI BibTeX RDF |
XML Digital Signature, Multi-Signed Document, non-repudiation, XML security |
50 | Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim 0001 |
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability |
50 | N. Asokan, Gene Tsudik, Michael Waidner |
Server-Supported Signatures. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
distributed systems, mobility, network security, electronic commerce, digital signatures, non-repudiation |
50 | Ning Zhang, Qi Shi 0001 |
Security Issues in an EDI Environment. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
EDI environment, electronic transmission, trade related documents, EDI system, EDI specific security requirement, non repudiation of receipt, heterogeneous system platform, protocol, electronic data interchange, Electronic Data Interchange, security threats, security issues |
49 | Fahad Ahmed, Asif Masood, Firdous Kausar |
An Efficient Multi Recipient Signcryption Scheme Offering Non Repudiation. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Non-repudiation, Signcryption, Discrete Logarithm Problem, Public verifiability, Diffie-Hellman Problem |
49 | Rüdiger Grimm |
A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-repudiation Proofs. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
IT-security model, secure state, trust model, non-repudiation, fair exchange, obligation, transition rule |
49 | Ming-Way Huang, Hsing-Bai Chen, Wei-Bin Lee |
An Efficient Non-repudiation Mechanism for SIP-Based Services. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
digital signature, session initiation protocol, accounting, non-repudiation, hash chaining |
49 | Bob Briscoe, Ian Fairman |
Nark: receiver-based multicast non-repudiation and key management. |
EC |
1999 |
DBLP DOI BibTeX RDF |
Internet, multicast, watermark, key management, smartcard, non-repudiation, audit trail |
49 | Ke Zeng |
Pseudonymous PKI for Ubiquitous Computing. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Mayla Brusò, Agostino Cortesi |
Non-repudiation Analysis with LySa. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
48 | Nicolai Kuntze, Andreas U. Schmidt, Christian Hett |
Non-Repudiation in Internet Telephony. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Judson Santiago, Laurent Vigneron |
Optimistic Non-repudiation Protocol Analysis. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Chung-Ming Ou, Chung-Ren Ou |
Non-repudiation Mechanism of Agent-Based Mobile Payment Systems: Perspectives on Wireless PKI. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Kun Wei, James Heather |
A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols. |
Formal Aspects in Security and Trust |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Almudena Alcaide, Juan M. Estévez-Tapiador, Antonio Izquierdo, José María Sierra |
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol. |
ICCSA (4) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Kun Wei, James Heather |
Towards Verification of Timed Non-repudiation Protocols. |
Formal Aspects in Security and Trust |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Ronggong Song, Larry Korba |
How to Make E-cash with Non-Repudiation and Anonymity. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Jose Antonio Onieva, Jianying Zhou 0001, Mildrey Carbonell, Javier López 0001 |
Intermediary Non-repudiation Protocols. |
CEC |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Seokwon Yang, Stanley Y. W. Su, Herman Lam |
A Non-Repudiation Message Transfer Protocol for E-commerce. |
CEC |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Giampaolo Bella, Lawrence C. Paulson |
Mechanical Proofs about a Non-repudiation Protocol. |
TPHOLs |
2001 |
DBLP DOI BibTeX RDF |
|
48 | Giampaolo Bella, Lawrence C. Paulson |
A Proof of Non-repudiation. |
Security Protocols Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
48 | Steve Kremer, Jean-François Raskin |
A Game-Based Verification of Non-repudiation and Fair Exchange Protocols. |
CONCUR |
2001 |
DBLP DOI BibTeX RDF |
|
48 | Birgit Pfitzmann, Ahmad-Reza Sadeghi |
Anonymous Fingerprinting with Direct Non-repudiation. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
digital coin, anonymity, fingerprinting, restrictiveness |
48 | Jianying Zhou 0001, Dieter Gollmann |
A Fair Non-repudiation Protocol. |
S&P |
1996 |
DBLP DOI BibTeX RDF |
fair nonrepudiation protocol, message sender, message receiver, cryptography, protocols, formal verification, formal verification, encryption, trusted third party |
40 | Alessandro Aldini, Roberto Gorrieri |
Security Analysis of a Probabilistic Non-repudiation Protocol. |
PAPM-PROBMIV |
2002 |
DBLP DOI BibTeX RDF |
|
39 | Els Van Herreweghen |
Non-repudiation in SET: Open Issues. |
Financial Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
38 | Varad Kirtane, C. Pandu Rangan |
RSA-TBOS signcryption with proxy re-encryption. |
Digital Rights Management Workshop |
2008 |
DBLP DOI BibTeX RDF |
signcryption, proxy re-encryption |
38 | Wei Fan, Huaying Shu, Qiang Yan 0002, Fang Wang |
A Fair Mobile Payment Protocol. |
APNOMS |
2008 |
DBLP DOI BibTeX RDF |
Mobile payment protocol, Fairness, Non-repudiation, Concurrent signatures |
38 | Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina |
Parametric probabilistic transition systems for system design and analysis. |
Formal Aspects Comput. |
2007 |
DBLP DOI BibTeX RDF |
Probabilistic non-repudiation protocol, Reachability, Parameters, Discrete-time Markov chains |
38 | Marc Girault, David Lefranc |
Server-Aided Verification: Theory and Practice. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
identification protocol, digital signature, zero-knowledge, discrete logarithm, pairing, non-repudiation, bilinear map, interactive proof |
38 | Guilin Wang, Feng Bao 0001, Kenji Imamoto, Kouichi Sakurai |
Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
security protocol, non-repudiation, fair exchange, certified email |
38 | Guilin Wang, Feng Bao 0001, Jianying Zhou 0001 |
On the Security of a Certified E-Mail Scheme. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
non-repudiation, fair exchange, certified e-mail |
38 | Jianying Zhou 0001 |
On the Security of a Multi-party Certified Email Protocol. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
security protocol, non-repudiation, certified email |
38 | Ari Juels, Jorge Guajardo |
RSA Key Generation with Verifiable Randomness. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
verifiable randomness, public-key infrastructure, zero knowledge, non-repudiation, certificate authority, key generation |
38 | Kenji Imamoto, Kouichi Sakurai |
A Certified E-mail System with Receiver's Selective Usage of Delivery Authority. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
receiver's selective protocols, electronic commerce, non-repudiation, certified e-mail |
36 | Yanping Li, Liaojun Pang |
Multi-party Non-repudiation Protocol with Different Message Exchanged. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Indranil Saha, Debapriyay Mukhopadhyay |
Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Mildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier López 0001, Jianying Zhou 0001 |
Estimation of TTP Features in Non-repudiation Service. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Ki-Woong Park, Hyunchul Seok, Kyu Ho Park |
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices. |
AINA Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Yoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah |
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks. |
ISCC |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Susan Pancho-Festin, Dieter Gollmann |
On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol. |
Formal Aspects in Security and Trust |
2005 |
DBLP DOI BibTeX RDF |
|
36 | M. Bilal, Johnson P. Thomas, Mathews Thomas, Subil Abraham |
Fair BPEL Processes Transaction using Non-Repudiation Protocols. |
IEEE SCC |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Mildrey Carbonell, Jose Antonio Onieva, Javier López 0001, Deborah Galpert, Jianying Zhou 0001 |
Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Sigrid Gürgens, Carsten Rudolph |
Security Analysis of (Un-) Fair Non-repudiation Protocols. |
FASec |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Togdé Ngarenon, Augustin P. Sarr |
An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation. |
SPACE |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Augustin P. Sarr, Papa B. Seye, Togdé Ngarenon |
A Practical and Insider Secure Signcryption with Non-interactive Non-repudiation. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Jia Fan, Yuliang Zheng 0001, Xiaohu Tang |
Signcryption with Non-interactive Non-repudiation without Random Oracles. |
Trans. Comput. Sci. |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Sean Turner |
Secure/Multipurpose Internet Mail Extensions. |
IEEE Internet Comput. |
2010 |
DBLP DOI BibTeX RDF |
S/MIME, message integrity, non-repudiation of origin, Internet, authentication, digital signatures, encryption, IETF, data confidentiality |
26 | Thomas Zefferer, Thomas Knall |
An electronic-signature based circular resolution database system. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
Austrian citizen card, business workflow, circular resolution, qualified electronic signature, integrity, decision making, non-repudiation, electronic document |
26 | Ki-Woong Park, Sung Kyu Park, Jaesun Han, Kyu Ho Park |
THEMIS: Towards Mutually Verifiable Billing Transactions in the Cloud Computing Environment. |
IEEE CLOUD |
2010 |
DBLP DOI BibTeX RDF |
Cloud Computing, PKI, Non-Repudiation, Billing |
26 | Thomas Walter 0001, Christian Schaefer, Gina Kounga, Makoto Hamatsu |
Evidence Gathering for Remuneration of Shared Connections. |
CNSR |
2008 |
DBLP DOI BibTeX RDF |
connection sharing, remuneration, authentication, authorization, evidences, non-repudiation |
26 | Jinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou, Jianhua Jiang |
LMCM: Layered Multiple Chaining Model for Authenticating Multicast Streams. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
Source Authentication, Chain hashing, Non-repudiation, Multicast security |
26 | Wei Fan, Huaying Shu, Qiang Yan 0002, Xin Liu |
Two Fair Payment Protocols for E-Commerce Transaction. |
CONFENIS (2) |
2007 |
DBLP DOI BibTeX RDF |
E-payment protocol, TTP, Security, E-commerce, Fairness, Non-repudiation, Concurrent signatures |
26 | Guido Rotondi, Gianpiero Guerrera |
A consistent history authentication protocol. |
ACM SIGSOFT Softw. Eng. Notes |
2006 |
DBLP DOI BibTeX RDF |
dentification, authentication, trust, non repudiation, SSL |
26 | Blerim Rexha |
Increasing User Privacy in Online Transactions with X.509 v3 Certificate Private Extensions and Smartcards. |
CEC |
2005 |
DBLP DOI BibTeX RDF |
X.509 v3 identity and attribute certificates, security, privacy, digital signature, encryption, smartcards, non-repudiation, SET, online transaction |
26 | Paul Robinson, Nick Cook, Santosh K. Shrivastava |
Implementing Fair Non-repudiable Interactions with Web Services. |
EDOC |
2005 |
DBLP DOI BibTeX RDF |
Inter-enterprise collaboration and virtual enterprises, Middleware standards and systems, Security, Web services, Non-repudiation, Fair exchange, Enterprise computing |
26 | Nick Cook, Paul Robinson, Santosh K. Shrivastava |
Component Middleware to Support Non-repudiable Service Interactions. |
DSN |
2004 |
DBLP DOI BibTeX RDF |
FT Architecture/Middleware Software Engineering, Service Composition, Non-repudiation, System Security |
26 | Yacine Challal, Abdelmadjid Bouabdallah, Yoann Hinard |
Efficient Multicast Source Authentication using Layered Hash-Chaining Scheme. |
LCN |
2004 |
DBLP DOI BibTeX RDF |
Layered hash-chaining, Multicast streaming, Non-repudiation |
26 | Ahto Buldas, Peeter Laud, Helger Lipmaa |
Accountable certificate management using undeniable attestations. |
CCS |
2000 |
DBLP DOI BibTeX RDF |
accountable certificate management, authenticated search trees, long-term authenticity, public-key infrastructure, non-repudiation, search trees, time-stamping, attesters |
26 | Jianying Zhou 0001, Kwok-Yan Lam |
Undeniable Billing in Mobile Communication. |
MobiCom |
1998 |
DBLP DOI BibTeX RDF |
mobile communication security, undeniable billing, cryptographic protocol, non-repudiation |
25 | Tian-Fu Lee, Tzonelih Hwang, Shu-Hui Chang, Song-Kong Chong |
Enhanced delegation-based authentication protocol for PCSs. |
IEEE Trans. Wirel. Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Lifeng Sang, Anish Arora |
A Wireless Security Framework without Shared Secrets. |
SSS |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Shouhuai Xu, Xiaohu Li, T. Paul Parker |
Exploiting social networks for threshold signing: attack-resilience vs. availability. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
attack-resilience, threshold signing, social networks, availability, threshold cryptography |
25 | Yang Xu 0021, Xiaoyao Xie |
Security analysis of routing protocol for MANET based on extended Rubin logic. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Chung-Ming Ou, Chung-Ren Ou |
SETNR/A: An Agent-Based Secure Payment Protocol for Mobile Commerce. |
KES-AMSTA |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, Seungjae Yoo |
Secret Signatures: How to Achieve Business Privacy Efficiently? |
WISA |
2007 |
DBLP DOI BibTeX RDF |
Secret signature, signature privacy, public provability, public auction, anonymity, key agreement |
25 | Mohammed Assora, James Kadirire, Ayoub Shirvani |
Using WPKI for Security of Web Transaction. |
EC-Web |
2007 |
DBLP DOI BibTeX RDF |
Web transaction security, wireless security services, digital signature, SSL/TLS |
25 | Istemi Ekin Akkus, Öznur Özkasap, M. Reha Civanlar |
Secure Transmission of Video on an End System Multicast Using Public Key Cryptography. |
MRCS |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Aleksandra Nenadic, Ning Zhang 0001, Qi Shi 0001, Carole A. Goble |
DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery. |
EEE |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Aleksandra Nenadic, Ning Zhang 0001, Stephen K. Barton |
Fair certified e-mail delivery. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Li-Sha He, Ning Zhang 0001 |
A new signature scheme: joint-signature. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
M-Payment, digital signature, security protocol, M-Commerce |
25 | Aleksandra Nenadic, Ning Zhang 0001, Stephen K. Barton |
A Security Protocol for Certified E-Goods Delivery. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 435 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ >>] |
|