The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for repudiation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-1998 (20) 1999-2000 (32) 2001 (15) 2002 (24) 2003 (30) 2004 (38) 2005 (49) 2006 (29) 2007 (53) 2008 (37) 2009 (31) 2010 (17) 2011-2013 (23) 2014-2016 (16) 2017-2018 (15) 2019-2023 (20) 2024 (1)
Publication types (Num. hits)
article(96) book(1) incollection(2) inproceedings(348) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 412 occurrences of 219 keywords

Results
Found 450 publication records. Showing 450 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
115Michael Wichert, David B. Ingham, Steve J. Caughey Non-repudiation Evidence Generation for CORBA using XML. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Security, XML, e-commerce, CORBA, non-repudiation
93Jianying Zhou 0001, Robert H. Deng, Feng Bao 0001 Evolution of Fair Non-repudiation with TTP. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF fair non-repudiation, trusted third party, secure electronic commerce
82Lu Bai, Chunhe Xia, Xiaojian Li, Haiquan Wang A Bulk Email Oriented Multi-party Non-repudiation Exchange Protocol. Search on Bibsonomy WISM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SVO logic, bulk email, protocol, fairness, Encryption, non-repudiation
82Eun-Jun Yoon, Kee-Young Yoo Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Public key substitution attack, Cryptanalysis, Non-repudiation, Key authentication
82Sigrid Gürgens, Carsten Rudolph, Holger Vogt On the security of fair non-repudiation protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Fair non-repudiation, Security protocols, Protocol analysis, Protocol design
82Jianying Zhou 0001, Dieter Gollmann An Efficient Non-repudiation Protocol . Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF network security, security protocols, non-repudiation
82Jianying Zhou 0001, Dieter Gollmann Observations on Non-repudiation. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF non-repudiation, communications security, ISO standards
75C.-C. Liew, Wee Keong Ng, Ee-Peng Lim, B.-S. Tan, Kok-Leong Ong Non-Repudiation in an Agent-Based Electronic Commerce System. Search on Bibsonomy DEXA Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
71Francis Klay, Laurent Vigneron Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AVISPA Tool, authentication, fairness, Cryptographic protocols, non-repudiation, automatic analysis
71Jose Antonio Onieva, Javier López 0001, Rodrigo Roman, Jianying Zhou 0001, Stefanos Gritzalis Integration of non-repudiation services in mobile DRM scenarios. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mobile applications, Digital rights management, Non-repudiation, Secure electronic commerce
71John Malone-Lee Signcryption with Non-interactive Non-repudiation. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF provable security, non-repudiation, Signcryption
71Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee A key authentication scheme with non-repudiation. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF non-repudiation security, authentication, certificate, discrete logarithm, public key
71Sungwoo Tak, Eun Kyo Park A Software Framework for Non-Repudiation Service based on Adaptive Secure Methodology in Electronic Commerce. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security software framework, electronic commerce (e-commerce), adaptive secure methodology, non-repudiation
64Sigrid Gürgens, Carsten Rudolph, Holger Vogt On the Security of Fair Non-repudiation Protocols. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
64Olivier Markowitch, Steve Kremer An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
64Olivier Markowitch, Steve Kremer A Multi-party Optimistic Non-repudiation Protocol. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
62Omaima Bamasak, Ning Zhang 0001 A secure method for signature delegation to mobile agents. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF signature delegation, non-repudiation, mobile agent security
60Chung-Ming Ou, Chung-Ren Ou Adaptation of proxy certificates to non-repudiation protocol of agent-based mobile payment systems. Search on Bibsonomy Appl. Intell. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mobile agent, PKI, Non-repudiation, Mobile payment, Proxy certificate
60Michael Conrad Non-repudiation mechanisms for peer-to-peer networks: enabling technology for peer-to-peer economic markets. Search on Bibsonomy CoNEXT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF proof of reception, peer-to-peer networks, non-repudiation
60Sigrid Gürgens, Carsten Rudolph Security analysis of efficient (Un-)fair non-repudiation protocols. Search on Bibsonomy Formal Aspects Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Asynchronous product automata, Fairness, Non-repudiation, Protocol analysis
60Steve Kremer, Olivier Markowitch Fair multi-party non-repudiation protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Group communications, Non-repudiation, Fair exchange
60Tom Coffey, Puneet Saidha, Peter Burrows Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt. Search on Bibsonomy ISICT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptographic protocol verification, logical postulates, proof of origin, proof of receipt, logics, security protocols, public-key cryptography, non-repudiation, deductive reasoning
53Guoqiang Li 0001, Mizuhito Ogawa On-the-Fly Model Checking of Fair Non-repudiation Protocols. Search on Bibsonomy ATVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
51Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng Minimizing TTP's involvement in signature validation. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Validity of evidence, Digital signature, Non-repudiation
51Hossein Ghodosi, Josef Pieprzyk Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Cryptography, Digital Signatures, Proxy Signatures, ElGamal signatures
50Simon E. Parkin, David B. Ingham, Graham Morgan A Message Oriented Middleware Solution Enabling Non-repudiation Evidence Generation for Reliable Web Services. Search on Bibsonomy ISAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web Services, Middleware, Non-repudiation, MOM
50Kwangjo Kim, Sangjoon Park, Joonsang Baek Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Fairness, Cryptographic Protocol, Non-repudiation, Trusted Third Party
50Jerrold F. Stach, Eun Kyo Park Analysis of a Non Repudiation Authentication Protocol for Personal Communication Systems. Search on Bibsonomy ICCCN The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Personal Communications System (PCS), Non-repudiation of services, traffic analysis, one way function
44Ke Zeng Pseudonymous PKI for Ubiquitous Computing. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Mayla Brusò, Agostino Cortesi Non-repudiation Analysis with LySa. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42Nicolai Kuntze, Andreas U. Schmidt, Christian Hett Non-Repudiation in Internet Telephony. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Judson Santiago, Laurent Vigneron Optimistic Non-repudiation Protocol Analysis. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Chung-Ming Ou, Chung-Ren Ou Non-repudiation Mechanism of Agent-Based Mobile Payment Systems: Perspectives on Wireless PKI. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Kun Wei, James Heather A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Almudena Alcaide, Juan M. Estévez-Tapiador, Antonio Izquierdo, José María Sierra A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol. Search on Bibsonomy ICCSA (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Kun Wei, James Heather Towards Verification of Timed Non-repudiation Protocols. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Ronggong Song, Larry Korba How to Make E-cash with Non-Repudiation and Anonymity. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Jose Antonio Onieva, Jianying Zhou 0001, Mildrey Carbonell, Javier López 0001 Intermediary Non-repudiation Protocols. Search on Bibsonomy CEC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
42Seokwon Yang, Stanley Y. W. Su, Herman Lam A Non-Repudiation Message Transfer Protocol for E-commerce. Search on Bibsonomy CEC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
42Giampaolo Bella, Lawrence C. Paulson Mechanical Proofs about a Non-repudiation Protocol. Search on Bibsonomy TPHOLs The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42Giampaolo Bella, Lawrence C. Paulson A Proof of Non-repudiation. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42Steve Kremer, Jean-François Raskin A Game-Based Verification of Non-repudiation and Fair Exchange Protocols. Search on Bibsonomy CONCUR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42Birgit Pfitzmann, Ahmad-Reza Sadeghi Anonymous Fingerprinting with Direct Non-repudiation. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF digital coin, anonymity, fingerprinting, restrictiveness
42Jianying Zhou 0001, Dieter Gollmann A Fair Non-repudiation Protocol. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF fair nonrepudiation protocol, message sender, message receiver, cryptography, protocols, formal verification, formal verification, encryption, trusted third party
40Tawfiq S. M. Barhoom, Shen-sheng Zhang Trusted Exam Marks System at IUG Using XML-Signature. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XML Digital Signature, Multi-Signed Document, non-repudiation, XML security
40Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim 0001 Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability
40N. Asokan, Gene Tsudik, Michael Waidner Server-Supported Signatures. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF distributed systems, mobility, network security, electronic commerce, digital signatures, non-repudiation
40Ning Zhang, Qi Shi 0001 Security Issues in an EDI Environment. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF EDI environment, electronic transmission, trade related documents, EDI system, EDI specific security requirement, non repudiation of receipt, heterogeneous system platform, protocol, electronic data interchange, Electronic Data Interchange, security threats, security issues
39Fahad Ahmed, Asif Masood, Firdous Kausar An Efficient Multi Recipient Signcryption Scheme Offering Non Repudiation. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Non-repudiation, Signcryption, Discrete Logarithm Problem, Public verifiability, Diffie-Hellman Problem
39Rüdiger Grimm A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-repudiation Proofs. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IT-security model, secure state, trust model, non-repudiation, fair exchange, obligation, transition rule
39Ming-Way Huang, Hsing-Bai Chen, Wei-Bin Lee An Efficient Non-repudiation Mechanism for SIP-Based Services. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF digital signature, session initiation protocol, accounting, non-repudiation, hash chaining
39Bob Briscoe, Ian Fairman Nark: receiver-based multicast non-repudiation and key management. Search on Bibsonomy EC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Internet, multicast, watermark, key management, smartcard, non-repudiation, audit trail
33Varad Kirtane, C. Pandu Rangan RSA-TBOS signcryption with proxy re-encryption. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2008 DBLP  DOI  BibTeX  RDF signcryption, proxy re-encryption
31Yanping Li, Liaojun Pang Multi-party Non-repudiation Protocol with Different Message Exchanged. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Indranil Saha, Debapriyay Mukhopadhyay Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Sachin Gupta, Anoop M. Namboodiri Repudiation Detection in Handwritten Documents. Search on Bibsonomy ICB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Mildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier López 0001, Jianying Zhou 0001 Estimation of TTP Features in Non-repudiation Service. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Ki-Woong Park, Hyunchul Seok, Kyu Ho Park pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Yoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks. Search on Bibsonomy ISCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Susan Pancho-Festin, Dieter Gollmann On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31M. Bilal, Johnson P. Thomas, Mathews Thomas, Subil Abraham Fair BPEL Processes Transaction using Non-Repudiation Protocols. Search on Bibsonomy IEEE SCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Mildrey Carbonell, Jose Antonio Onieva, Javier López 0001, Deborah Galpert, Jianying Zhou 0001 Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Alessandro Aldini, Roberto Gorrieri Security Analysis of a Probabilistic Non-repudiation Protocol. Search on Bibsonomy PAPM-PROBMIV The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
31Sigrid Gürgens, Carsten Rudolph Security Analysis of (Un-) Fair Non-repudiation Protocols. Search on Bibsonomy FASec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
31Li Bai, Ramasubramaniam Achuthanandam, Moshe Kam Access Revocation and Prevention of False Repudiation in Secure Email Exchanges. Search on Bibsonomy ISADS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
31Els Van Herreweghen Non-repudiation in SET: Open Issues. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
29Wei Fan, Huaying Shu, Qiang Yan 0002, Fang Wang A Fair Mobile Payment Protocol. Search on Bibsonomy APNOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Mobile payment protocol, Fairness, Non-repudiation, Concurrent signatures
29Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina Parametric probabilistic transition systems for system design and analysis. Search on Bibsonomy Formal Aspects Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Probabilistic non-repudiation protocol, Reachability, Parameters, Discrete-time Markov chains
29Marc Girault, David Lefranc Server-Aided Verification: Theory and Practice. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF identification protocol, digital signature, zero-knowledge, discrete logarithm, pairing, non-repudiation, bilinear map, interactive proof
29Guilin Wang, Feng Bao 0001, Kenji Imamoto, Kouichi Sakurai Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security protocol, non-repudiation, fair exchange, certified email
29Guilin Wang, Feng Bao 0001, Jianying Zhou 0001 On the Security of a Certified E-Mail Scheme. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF non-repudiation, fair exchange, certified e-mail
29Jianying Zhou 0001 On the Security of a Multi-party Certified Email Protocol. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security protocol, non-repudiation, certified email
29Ari Juels, Jorge Guajardo RSA Key Generation with Verifiable Randomness. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF verifiable randomness, public-key infrastructure, zero knowledge, non-repudiation, certificate authority, key generation
29Kenji Imamoto, Kouichi Sakurai A Certified E-mail System with Receiver's Selective Usage of Delivery Authority. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF receiver's selective protocols, electronic commerce, non-repudiation, certified e-mail
22Tian-Fu Lee, Tzonelih Hwang, Shu-Hui Chang, Song-Kong Chong Enhanced delegation-based authentication protocol for PCSs. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Lifeng Sang, Anish Arora A Wireless Security Framework without Shared Secrets. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Shouhuai Xu, Xiaohu Li, T. Paul Parker Exploiting social networks for threshold signing: attack-resilience vs. availability. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack-resilience, threshold signing, social networks, availability, threshold cryptography
22Yang Xu 0021, Xiaoyao Xie Security analysis of routing protocol for MANET based on extended Rubin logic. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Chung-Ming Ou, Chung-Ren Ou SETNR/A: An Agent-Based Secure Payment Protocol for Mobile Commerce. Search on Bibsonomy KES-AMSTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, Seungjae Yoo Secret Signatures: How to Achieve Business Privacy Efficiently? Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secret signature, signature privacy, public provability, public auction, anonymity, key agreement
22Mohammed Assora, James Kadirire, Ayoub Shirvani Using WPKI for Security of Web Transaction. Search on Bibsonomy EC-Web The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web transaction security, wireless security services, digital signature, SSL/TLS
22Istemi Ekin Akkus, Öznur Özkasap, M. Reha Civanlar Secure Transmission of Video on an End System Multicast Using Public Key Cryptography. Search on Bibsonomy MRCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Aleksandra Nenadic, Ning Zhang 0001, Qi Shi 0001, Carole A. Goble DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery. Search on Bibsonomy EEE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Aleksandra Nenadic, Ning Zhang 0001, Stephen K. Barton Fair certified e-mail delivery. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Li-Sha He, Ning Zhang 0001 A new signature scheme: joint-signature. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF M-Payment, digital signature, security protocol, M-Commerce
22Aleksandra Nenadic, Ning Zhang 0001, Stephen K. Barton A Security Protocol for Certified E-Goods Delivery. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai The Role of Arbiters in Asymmetric Authentication Schemes. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Jianying Zhou 0001 Maintaining the Validity of Digital Signatures in B2B Applications. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Moni Naor Deniable Ring Authentication. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Peer Hasselmeyer, Markus Schumacher, Marco Voß Pay As You Go-Associating Costs with Jini Leases. Search on Bibsonomy EDOC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Jini leases, time-constrained access, commercial environment authentication, Jini-enabled services, cryptography, encryption, leasing, distributed garbage collection, fault-tolerant distributed applications
20Mohamed Rasslan, Mahmoud M. Nasreldin, Doaa Abdelrahman, Aya Elshobaky, Heba Aslan Networking and cryptography library with a non-repudiation flavor for blockchain. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Ke Yang 0007, Meihua Xiao, Xiaomei Zhong, Yingqiang Zhong A novel formal logic for formal analysis of timeliness in non-repudiation protocols. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Valentin Zieglmeier Appending Data to Blockchain is not Sufficient for Non-repudiation of Receipt. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Nayana Hegde, Sunilkumar S. Manvi Distributed integrity and non-repudiation scheme in the dynamic vehicular cloud environment. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Rui Zhang, Lei Zhang 0009, Kim-Kwang Raymond Choo, Tong Chen Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Togdé Ngarenon, Augustin P. Sarr An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation. Search on Bibsonomy SPACE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Yaorui He, Ting Liang, Pei Huang 0024, Zhe Xia Verifiable Attribute-Based Proxy Re-encryption with Non-repudiation Based on Blockchain. Search on Bibsonomy BlockTEA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Xu Guo Fairness analysis of extra-gain guilty of a non-repudiation protocol. Search on Bibsonomy Frontiers Inf. Technol. Electron. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Fei Chen 0003, Jiahao Wang, Jianqiang Li, Yang Xu 0013, Cheng Zhang, Tao Xiang 0001 TrustBuilder: A non-repudiation scheme for IoT cloud applications. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 450 (100 per page; Change: )
Pages: [1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license