The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase non-repudiation (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-1998 (18) 1999-2000 (32) 2001-2002 (37) 2003 (29) 2004 (36) 2005 (48) 2006 (29) 2007 (48) 2008 (36) 2009 (31) 2010 (17) 2011-2013 (23) 2014-2016 (15) 2017-2018 (15) 2019-2023 (20) 2024 (1)
Publication types (Num. hits)
article(94) book(1) incollection(2) inproceedings(335) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 398 occurrences of 211 keywords

Results
Found 435 publication records. Showing 435 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
135Michael Wichert, David B. Ingham, Steve J. Caughey Non-repudiation Evidence Generation for CORBA using XML. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Security, XML, e-commerce, CORBA, non-repudiation
111Jianying Zhou 0001, Robert H. Deng, Feng Bao 0001 Evolution of Fair Non-repudiation with TTP. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF fair non-repudiation, trusted third party, secure electronic commerce
98Lu Bai, Chunhe Xia, Xiaojian Li, Haiquan Wang A Bulk Email Oriented Multi-party Non-repudiation Exchange Protocol. Search on Bibsonomy WISM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SVO logic, bulk email, protocol, fairness, Encryption, non-repudiation
98Eun-Jun Yoon, Kee-Young Yoo Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Public key substitution attack, Cryptanalysis, Non-repudiation, Key authentication
98Sigrid Gürgens, Carsten Rudolph, Holger Vogt On the security of fair non-repudiation protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Fair non-repudiation, Security protocols, Protocol analysis, Protocol design
98Jianying Zhou 0001, Dieter Gollmann An Efficient Non-repudiation Protocol . Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF network security, security protocols, non-repudiation
98Jianying Zhou 0001, Dieter Gollmann Observations on Non-repudiation. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF non-repudiation, communications security, ISO standards
90John Malone-Lee Signcryption with Non-interactive Non-repudiation. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF provable security, non-repudiation, Signcryption
86Francis Klay, Laurent Vigneron Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AVISPA Tool, authentication, fairness, Cryptographic protocols, non-repudiation, automatic analysis
86Jose Antonio Onieva, Javier López 0001, Rodrigo Roman, Jianying Zhou 0001, Stefanos Gritzalis Integration of non-repudiation services in mobile DRM scenarios. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mobile applications, Digital rights management, Non-repudiation, Secure electronic commerce
86Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee A key authentication scheme with non-repudiation. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF non-repudiation security, authentication, certificate, discrete logarithm, public key
86Sungwoo Tak, Eun Kyo Park A Software Framework for Non-Repudiation Service based on Adaptive Secure Methodology in Electronic Commerce. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security software framework, electronic commerce (e-commerce), adaptive secure methodology, non-repudiation
85C.-C. Liew, Wee Keong Ng, Ee-Peng Lim, B.-S. Tan, Kok-Leong Ong Non-Repudiation in an Agent-Based Electronic Commerce System. Search on Bibsonomy DEXA Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
75Tom Coffey, Puneet Saidha, Peter Burrows Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt. Search on Bibsonomy ISICT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptographic protocol verification, logical postulates, proof of origin, proof of receipt, logics, security protocols, public-key cryptography, non-repudiation, deductive reasoning
74Chung-Ming Ou, Chung-Ren Ou Adaptation of proxy certificates to non-repudiation protocol of agent-based mobile payment systems. Search on Bibsonomy Appl. Intell. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mobile agent, PKI, Non-repudiation, Mobile payment, Proxy certificate
74Michael Conrad Non-repudiation mechanisms for peer-to-peer networks: enabling technology for peer-to-peer economic markets. Search on Bibsonomy CoNEXT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF proof of reception, peer-to-peer networks, non-repudiation
74Sigrid Gürgens, Carsten Rudolph Security analysis of efficient (Un-)fair non-repudiation protocols. Search on Bibsonomy Formal Aspects Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Asynchronous product automata, Fairness, Non-repudiation, Protocol analysis
74Steve Kremer, Olivier Markowitch Fair multi-party non-repudiation protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Group communications, Non-repudiation, Fair exchange
73Sigrid Gürgens, Carsten Rudolph, Holger Vogt On the Security of Fair Non-repudiation Protocols. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
73Olivier Markowitch, Steve Kremer An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
73Olivier Markowitch, Steve Kremer A Multi-party Optimistic Non-repudiation Protocol. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
71Omaima Bamasak, Ning Zhang 0001 A secure method for signature delegation to mobile agents. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF signature delegation, non-repudiation, mobile agent security
62Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng Minimizing TTP's involvement in signature validation. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Validity of evidence, Digital signature, Non-repudiation
61Simon E. Parkin, David B. Ingham, Graham Morgan A Message Oriented Middleware Solution Enabling Non-repudiation Evidence Generation for Reliable Web Services. Search on Bibsonomy ISAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web Services, Middleware, Non-repudiation, MOM
61Kwangjo Kim, Sangjoon Park, Joonsang Baek Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Fairness, Cryptographic Protocol, Non-repudiation, Trusted Third Party
61Jerrold F. Stach, Eun Kyo Park Analysis of a Non Repudiation Authentication Protocol for Personal Communication Systems. Search on Bibsonomy ICCCN The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Personal Communications System (PCS), Non-repudiation of services, traffic analysis, one way function
60Guoqiang Li 0001, Mizuhito Ogawa On-the-Fly Model Checking of Fair Non-repudiation Protocols. Search on Bibsonomy ATVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
56Hossein Ghodosi, Josef Pieprzyk Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Cryptography, Digital Signatures, Proxy Signatures, ElGamal signatures
51Tawfiq S. M. Barhoom, Shen-sheng Zhang Trusted Exam Marks System at IUG Using XML-Signature. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XML Digital Signature, Multi-Signed Document, non-repudiation, XML security
50Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim 0001 Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability
50N. Asokan, Gene Tsudik, Michael Waidner Server-Supported Signatures. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF distributed systems, mobility, network security, electronic commerce, digital signatures, non-repudiation
50Ning Zhang, Qi Shi 0001 Security Issues in an EDI Environment. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF EDI environment, electronic transmission, trade related documents, EDI system, EDI specific security requirement, non repudiation of receipt, heterogeneous system platform, protocol, electronic data interchange, Electronic Data Interchange, security threats, security issues
49Fahad Ahmed, Asif Masood, Firdous Kausar An Efficient Multi Recipient Signcryption Scheme Offering Non Repudiation. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Non-repudiation, Signcryption, Discrete Logarithm Problem, Public verifiability, Diffie-Hellman Problem
49Rüdiger Grimm A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-repudiation Proofs. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IT-security model, secure state, trust model, non-repudiation, fair exchange, obligation, transition rule
49Ming-Way Huang, Hsing-Bai Chen, Wei-Bin Lee An Efficient Non-repudiation Mechanism for SIP-Based Services. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF digital signature, session initiation protocol, accounting, non-repudiation, hash chaining
49Bob Briscoe, Ian Fairman Nark: receiver-based multicast non-repudiation and key management. Search on Bibsonomy EC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Internet, multicast, watermark, key management, smartcard, non-repudiation, audit trail
49Ke Zeng Pseudonymous PKI for Ubiquitous Computing. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Mayla Brusò, Agostino Cortesi Non-repudiation Analysis with LySa. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
48Nicolai Kuntze, Andreas U. Schmidt, Christian Hett Non-Repudiation in Internet Telephony. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
48Judson Santiago, Laurent Vigneron Optimistic Non-repudiation Protocol Analysis. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
48Chung-Ming Ou, Chung-Ren Ou Non-repudiation Mechanism of Agent-Based Mobile Payment Systems: Perspectives on Wireless PKI. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
48Kun Wei, James Heather A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Almudena Alcaide, Juan M. Estévez-Tapiador, Antonio Izquierdo, José María Sierra A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol. Search on Bibsonomy ICCSA (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48Kun Wei, James Heather Towards Verification of Timed Non-repudiation Protocols. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48Ronggong Song, Larry Korba How to Make E-cash with Non-Repudiation and Anonymity. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
48Jose Antonio Onieva, Jianying Zhou 0001, Mildrey Carbonell, Javier López 0001 Intermediary Non-repudiation Protocols. Search on Bibsonomy CEC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
48Seokwon Yang, Stanley Y. W. Su, Herman Lam A Non-Repudiation Message Transfer Protocol for E-commerce. Search on Bibsonomy CEC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
48Giampaolo Bella, Lawrence C. Paulson Mechanical Proofs about a Non-repudiation Protocol. Search on Bibsonomy TPHOLs The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
48Giampaolo Bella, Lawrence C. Paulson A Proof of Non-repudiation. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
48Steve Kremer, Jean-François Raskin A Game-Based Verification of Non-repudiation and Fair Exchange Protocols. Search on Bibsonomy CONCUR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
48Birgit Pfitzmann, Ahmad-Reza Sadeghi Anonymous Fingerprinting with Direct Non-repudiation. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF digital coin, anonymity, fingerprinting, restrictiveness
48Jianying Zhou 0001, Dieter Gollmann A Fair Non-repudiation Protocol. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF fair nonrepudiation protocol, message sender, message receiver, cryptography, protocols, formal verification, formal verification, encryption, trusted third party
40Alessandro Aldini, Roberto Gorrieri Security Analysis of a Probabilistic Non-repudiation Protocol. Search on Bibsonomy PAPM-PROBMIV The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
39Els Van Herreweghen Non-repudiation in SET: Open Issues. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
38Varad Kirtane, C. Pandu Rangan RSA-TBOS signcryption with proxy re-encryption. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2008 DBLP  DOI  BibTeX  RDF signcryption, proxy re-encryption
38Wei Fan, Huaying Shu, Qiang Yan 0002, Fang Wang A Fair Mobile Payment Protocol. Search on Bibsonomy APNOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Mobile payment protocol, Fairness, Non-repudiation, Concurrent signatures
38Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina Parametric probabilistic transition systems for system design and analysis. Search on Bibsonomy Formal Aspects Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Probabilistic non-repudiation protocol, Reachability, Parameters, Discrete-time Markov chains
38Marc Girault, David Lefranc Server-Aided Verification: Theory and Practice. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF identification protocol, digital signature, zero-knowledge, discrete logarithm, pairing, non-repudiation, bilinear map, interactive proof
38Guilin Wang, Feng Bao 0001, Kenji Imamoto, Kouichi Sakurai Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security protocol, non-repudiation, fair exchange, certified email
38Guilin Wang, Feng Bao 0001, Jianying Zhou 0001 On the Security of a Certified E-Mail Scheme. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF non-repudiation, fair exchange, certified e-mail
38Jianying Zhou 0001 On the Security of a Multi-party Certified Email Protocol. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security protocol, non-repudiation, certified email
38Ari Juels, Jorge Guajardo RSA Key Generation with Verifiable Randomness. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF verifiable randomness, public-key infrastructure, zero knowledge, non-repudiation, certificate authority, key generation
38Kenji Imamoto, Kouichi Sakurai A Certified E-mail System with Receiver's Selective Usage of Delivery Authority. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF receiver's selective protocols, electronic commerce, non-repudiation, certified e-mail
36Yanping Li, Liaojun Pang Multi-party Non-repudiation Protocol with Different Message Exchanged. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Indranil Saha, Debapriyay Mukhopadhyay Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Mildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier López 0001, Jianying Zhou 0001 Estimation of TTP Features in Non-repudiation Service. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Ki-Woong Park, Hyunchul Seok, Kyu Ho Park pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Yoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks. Search on Bibsonomy ISCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Susan Pancho-Festin, Dieter Gollmann On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36M. Bilal, Johnson P. Thomas, Mathews Thomas, Subil Abraham Fair BPEL Processes Transaction using Non-Repudiation Protocols. Search on Bibsonomy IEEE SCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Mildrey Carbonell, Jose Antonio Onieva, Javier López 0001, Deborah Galpert, Jianying Zhou 0001 Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Sigrid Gürgens, Carsten Rudolph Security Analysis of (Un-) Fair Non-repudiation Protocols. Search on Bibsonomy FASec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Togdé Ngarenon, Augustin P. Sarr An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation. Search on Bibsonomy SPACE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Augustin P. Sarr, Papa B. Seye, Togdé Ngarenon A Practical and Insider Secure Signcryption with Non-interactive Non-repudiation. Search on Bibsonomy C2SI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Jia Fan, Yuliang Zheng 0001, Xiaohu Tang Signcryption with Non-interactive Non-repudiation without Random Oracles. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Sean Turner Secure/Multipurpose Internet Mail Extensions. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF S/MIME, message integrity, non-repudiation of origin, Internet, authentication, digital signatures, encryption, IETF, data confidentiality
26Thomas Zefferer, Thomas Knall An electronic-signature based circular resolution database system. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Austrian citizen card, business workflow, circular resolution, qualified electronic signature, integrity, decision making, non-repudiation, electronic document
26Ki-Woong Park, Sung Kyu Park, Jaesun Han, Kyu Ho Park THEMIS: Towards Mutually Verifiable Billing Transactions in the Cloud Computing Environment. Search on Bibsonomy IEEE CLOUD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Cloud Computing, PKI, Non-Repudiation, Billing
26Thomas Walter 0001, Christian Schaefer, Gina Kounga, Makoto Hamatsu Evidence Gathering for Remuneration of Shared Connections. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF connection sharing, remuneration, authentication, authorization, evidences, non-repudiation
26Jinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou, Jianhua Jiang LMCM: Layered Multiple Chaining Model for Authenticating Multicast Streams. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Source Authentication, Chain hashing, Non-repudiation, Multicast security
26Wei Fan, Huaying Shu, Qiang Yan 0002, Xin Liu Two Fair Payment Protocols for E-Commerce Transaction. Search on Bibsonomy CONFENIS (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF E-payment protocol, TTP, Security, E-commerce, Fairness, Non-repudiation, Concurrent signatures
26Guido Rotondi, Gianpiero Guerrera A consistent history authentication protocol. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2006 DBLP  DOI  BibTeX  RDF dentification, authentication, trust, non repudiation, SSL
26Blerim Rexha Increasing User Privacy in Online Transactions with X.509 v3 Certificate Private Extensions and Smartcards. Search on Bibsonomy CEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF X.509 v3 identity and attribute certificates, security, privacy, digital signature, encryption, smartcards, non-repudiation, SET, online transaction
26Paul Robinson, Nick Cook, Santosh K. Shrivastava Implementing Fair Non-repudiable Interactions with Web Services. Search on Bibsonomy EDOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Inter-enterprise collaboration and virtual enterprises, Middleware standards and systems, Security, Web services, Non-repudiation, Fair exchange, Enterprise computing
26Nick Cook, Paul Robinson, Santosh K. Shrivastava Component Middleware to Support Non-repudiable Service Interactions. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF FT Architecture/Middleware Software Engineering, Service Composition, Non-repudiation, System Security
26Yacine Challal, Abdelmadjid Bouabdallah, Yoann Hinard Efficient Multicast Source Authentication using Layered Hash-Chaining Scheme. Search on Bibsonomy LCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Layered hash-chaining, Multicast streaming, Non-repudiation
26Ahto Buldas, Peeter Laud, Helger Lipmaa Accountable certificate management using undeniable attestations. Search on Bibsonomy CCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF accountable certificate management, authenticated search trees, long-term authenticity, public-key infrastructure, non-repudiation, search trees, time-stamping, attesters
26Jianying Zhou 0001, Kwok-Yan Lam Undeniable Billing in Mobile Communication. Search on Bibsonomy MobiCom The full citation details ... 1998 DBLP  DOI  BibTeX  RDF mobile communication security, undeniable billing, cryptographic protocol, non-repudiation
25Tian-Fu Lee, Tzonelih Hwang, Shu-Hui Chang, Song-Kong Chong Enhanced delegation-based authentication protocol for PCSs. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Lifeng Sang, Anish Arora A Wireless Security Framework without Shared Secrets. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Shouhuai Xu, Xiaohu Li, T. Paul Parker Exploiting social networks for threshold signing: attack-resilience vs. availability. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack-resilience, threshold signing, social networks, availability, threshold cryptography
25Yang Xu 0021, Xiaoyao Xie Security analysis of routing protocol for MANET based on extended Rubin logic. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Chung-Ming Ou, Chung-Ren Ou SETNR/A: An Agent-Based Secure Payment Protocol for Mobile Commerce. Search on Bibsonomy KES-AMSTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, Seungjae Yoo Secret Signatures: How to Achieve Business Privacy Efficiently? Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secret signature, signature privacy, public provability, public auction, anonymity, key agreement
25Mohammed Assora, James Kadirire, Ayoub Shirvani Using WPKI for Security of Web Transaction. Search on Bibsonomy EC-Web The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web transaction security, wireless security services, digital signature, SSL/TLS
25Istemi Ekin Akkus, Öznur Özkasap, M. Reha Civanlar Secure Transmission of Video on an End System Multicast Using Public Key Cryptography. Search on Bibsonomy MRCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Aleksandra Nenadic, Ning Zhang 0001, Qi Shi 0001, Carole A. Goble DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery. Search on Bibsonomy EEE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Aleksandra Nenadic, Ning Zhang 0001, Stephen K. Barton Fair certified e-mail delivery. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Li-Sha He, Ning Zhang 0001 A new signature scheme: joint-signature. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF M-Payment, digital signature, security protocol, M-Commerce
25Aleksandra Nenadic, Ning Zhang 0001, Stephen K. Barton A Security Protocol for Certified E-Goods Delivery. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 435 (100 per page; Change: )
Pages: [1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license