The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for nonrepudiation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-2005 (16) 2006-2011 (17) 2013-2023 (12)
Publication types (Num. hits)
article(20) incollection(3) inproceedings(22)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 67 occurrences of 51 keywords

Results
Found 45 publication records. Showing 45 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
217Jose Antonio Onieva, Jianying Zhou 0001, Javier López 0001 Multiparty nonrepudiation: A survey. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multiparty applications, nonrepudiation, multiparty protocols
76Yumin Yuan A Threshold Proxy Signature Scheme with Nonrepudiation and Anonymity. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF threshold proxy signature, anonymity, Digital signature, proxy signature, nonrepudiation
46Giampaolo Bella, Lawrence C. Paulson Accountability protocols: Formalized and verified. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF inductive method, proof tools, Isabelle, Nonrepudiation, certified email
46Jorge Dávila, Javier López 0001, Antonio Mana, Juan J. Ortega, José M. Troya Development of Secure Internet Applications for Governmental Environments. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure Internet applications, governmental environments, public administrative procedures, economic benefits, citizen satisfaction, Project Alcance, Spanish R&D Programme, private transport companies, Andalucia regional government, Internet, authenticity, confidentiality, public administration, nonrepudiation
40Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi Secure E-Commerce Transactions for Multicast Services. Search on Bibsonomy CEC/EEE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Asad Ullah Khan, Nadeem Javaid, Muhammad Asghar Khan, Insaf Ullah A blockchain scheme for authentication, data sharing and nonrepudiation to secure internet of wireless sensor things. Search on Bibsonomy Clust. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Tuan-Vinh Le, Chien-Lung Hsu, Wei-Xin Chen A Hybrid Blockchain-Based Log Management Scheme With Nonrepudiation for Smart Grids. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
29Guruprakash Jayabalasamy, Srinivas Koppu High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
29Chin-Ling Chen, Tsai-Tung Yang, Yong-Yuan Deng, Chi-Hua Chen A secure Internet of Things medical information sharing and emergency notification system based on nonrepudiation mechanism. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
29Yang Xu 0013, Ju Ren 0001, Guojun Wang 0001, Cheng Zhang, Jidian Yang, Yaoxue Zhang A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
29Gwan-Hwan Hwang, Wei-Sian Huang, Jenn-Zjone Peng, Yu-Wei Lin Fulfilling mutual nonrepudiation for cloud storage. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Muqeet Ali, Rezwana Reaz, Mohamed G. Gouda Nonrepudiation Protocols Without a Trusted Party. Search on Bibsonomy NETYS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Gang Yu, Zhenfu Cao, Guang Zeng, Wenbao Han Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation. Search on Bibsonomy ProvSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Muqeet Ali, Rezwana Reaz, Mohamed G. Gouda Two-phase Nonrepudiation Protocols. Search on Bibsonomy ICCCNT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Muqeet Ali, Mohamed G. Gouda Nonrepudiation Protocols in Cloud Systems. Search on Bibsonomy ICCCNT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Gwan-Hwan Hwang, Jenn-Zjone Peng, Wei-Sian Huang A Mutual Nonrepudiation Protocol for Cloud Storage with Interchangeable Accesses of a Single Account from Multiple Devices. Search on Bibsonomy TrustCom/ISPA/IUCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29Jason King Measuring the forensic-ability of audit logs for nonrepudiation. Search on Bibsonomy ICSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29 Nonrepudiation Protocol. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Mike Just Nonrepudiation of Digital Signatures. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Panagiota Lagou, Gregory Chondrokoukis Choosing a Biometric for Nonrepudiation. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Panagiota Lagou, Gregory Chondrokoukis Survey on Nonrepudiation: Digital Signature Versus Biometrics. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Starsky H. Y. Wong, Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability. Search on Bibsonomy Security and Management The full citation details ... 2009 DBLP  BibTeX  RDF
29Ana Isabel González-Tablas Ferreres, A. Orfila Ramos, Arturo Ribagorda EVAWEB V2: Enhancing a Web-Based Assessment Systems Focused on Nonrepudiation Use and Teaching. Search on Bibsonomy Int. J. Web Based Learn. Teach. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Ayman Haggag, Mohamed Ghoneim, Jianming Lu, Takashi Yahagi Scalable Authentication and Nonrepudiation Technique for JPEG 2000 Images Using JPSEC Protection Tools. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Randy Sabett Nonrepudiation. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Chien-Lung Hsu, Tzong-Sun Wu Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Jianying Zhou 0001 Achieving Fair Nonrepudiation in Electronic Transactions. Search on Bibsonomy J. Organ. Comput. Electron. Commer. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Hung-Yu Lin, Lein Harn Authentication protocols with nonrepudiation services in personal communication systems. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
26Kwei-Jay Lin, Joe Zou, Yan Wang 0002 Accountability Computing for E-society. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF service accountability, security, quality of service, service-oriented architecture, trust, disclosure, liability, nonrepudiation
26Bob Blakley 0001, G. R. Blakley All sail, no anchor II: Acceptable high-end PKI. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Digital signature, Signature, PKI, Law, RSA cryptosystem, Nonrepudiation
26Petra Wohlmacher, Peter Pharow Applications in Health Care using Public-Key Certificates and Attribute Certificates. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures
26Jianying Zhou 0001, Dieter Gollmann A Fair Non-repudiation Protocol. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF fair nonrepudiation protocol, message sender, message receiver, cryptography, protocols, formal verification, formal verification, encryption, trusted third party
20A. Selcuk Uluagac, Christopher P. Lee 0001, Raheem A. Beyah, John A. Copeland Designing Secure Protocols for Wireless Sensor Networks. Search on Bibsonomy WASA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security in Wireless Sensor Networks, Security Services for Wireless Sensor Networks, Wireless Sensor Networks
20Gwan-Hwan Hwang, Yu-Hsuan Chang, Tao-Ku Chang An Operational Model and Language Support for Securing Web Services. Search on Bibsonomy ICWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Ki-Woong Park, Hyunchul Seok, Kyu Ho Park pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Gianluigi Me, Maurizio Adriano Strangio, Alexander Schuster Mobile Local Macropayments: Security and Prototyping. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF personal trusted device, ECIES, security, Java, handheld, payment
20Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold Secure Internet Banking Authentication. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF short-time passwords, short-lived passwords, taxonomy of attacks, authentication, Internet banking, public-key certificates
20Peter Gutmann, David Naccache, Charles C. Palmer When Hashes Collide. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptography, hashes, scripts
20M. Bilal, Johnson P. Thomas, Mathews Thomas, Subil Abraham Fair BPEL Processes Transaction using Non-Repudiation Protocols. Search on Bibsonomy IEEE SCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Carlo Blundo, Stelvio Cimato A Software Infrastructure for Authenticated Web Metering. Search on Bibsonomy Computer The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah A2cast: an adaptive source authentication protocol for multicast streams. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Omaima Bamasak, Ning Zhang 0001 A secure proxy signature protocol for agent-based M-commerce applications. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Hassen Saïdi, Victoria Stavridou, Bruno Dutertre Protocol Codesign. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Sung-Cheal Byun, Byung-Ha Ahn Symmetric and Asymmetric Cryptography Based Watermarking Scheme for Secure Electronic Commerce via the Internet. Search on Bibsonomy Human.Society@Internet 2003 The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Ross J. Anderson, Michael Roe The GCHQ Protocol and Its Problems. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #45 of 45 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license