|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 398 occurrences of 211 keywords
|
|
|
Results
Found 435 publication records. Showing 435 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
25 | Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai |
The Role of Arbiters in Asymmetric Authentication Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 428-441, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Jianying Zhou 0001 |
Maintaining the Validity of Digital Signatures in B2B Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 303-315, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Peer Hasselmeyer, Markus Schumacher, Marco Voß |
Pay As You Go-Associating Costs with Jini Leases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 4th International Enterprise Distributed Object Computing Conference (EDOC 2000), 25-28 September 2000, Makuhari, Japan, Proceedings, pp. 48-57, 2000, IEEE Computer Society, 0-7695-0865-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Jini leases, time-constrained access, commercial environment authentication, Jini-enabled services, cryptography, encryption, leasing, distributed garbage collection, fault-tolerant distributed applications |
24 | Mohamed Rasslan, Mahmoud M. Nasreldin, Doaa Abdelrahman, Aya Elshobaky, Heba Aslan |
Networking and cryptography library with a non-repudiation flavor for blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 1-14, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Ke Yang 0007, Meihua Xiao, Xiaomei Zhong, Yingqiang Zhong |
A novel formal logic for formal analysis of timeliness in non-repudiation protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 35(8), pp. 101664, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Valentin Zieglmeier |
Appending Data to Blockchain is not Sufficient for Non-repudiation of Receipt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.04781, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Nayana Hegde, Sunilkumar S. Manvi |
Distributed integrity and non-repudiation scheme in the dynamic vehicular cloud environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 20(3/4), pp. 315-348, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Rui Zhang, Lei Zhang 0009, Kim-Kwang Raymond Choo, Tong Chen |
Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 20(1), pp. 492-505, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Yaorui He, Ting Liang, Pei Huang 0024, Zhe Xia |
Verifiable Attribute-Based Proxy Re-encryption with Non-repudiation Based on Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BlockTEA ![In: Blockchain Technology and Emerging Applications - Third EAI International Conference, BlockTEA 2023, Wuhan, China, December 2-3, 2023, Proceedings, pp. 115-134, 2023, Springer, 978-3-031-60036-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Xu Guo |
Fairness analysis of extra-gain guilty of a non-repudiation protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Inf. Technol. Electron. Eng. ![In: Frontiers Inf. Technol. Electron. Eng. 23(6), pp. 893-908, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Fei Chen 0003, Jiahao Wang, Jianqiang Li, Yang Xu 0013, Cheng Zhang, Tao Xiang 0001 |
TrustBuilder: A non-repudiation scheme for IoT cloud applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 116, pp. 102664, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Ya-Fen Chang, Wei-Liang Tai, Ka-Ho Fung |
Offline User Authentication Ensuring Non-Repudiation and Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(24), pp. 9673, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Liang Wang 0010, Jun Li, Lina Zuo, Yu Wen, Haibo Liu, Wenyuan Liu |
T-Tracer: A Blockchain-Aided Symbol Mapping Watermarking Scheme for Traitor Tracing in Non-Repudiation Data Delivery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BSCI ![In: BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, Nagasaki, Japan, May 30, 2022., pp. 23-34, 2022, ACM, 978-1-4503-9175-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Liang Wang 0010, Jiayan Liu, Wenyuan Liu |
Staged data delivery protocol: A blockchain-based two-stage protocol for non-repudiation data delivery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 33(13), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Srdjan Capkun, Ercan Ozturk, Gene Tsudik, Karl Wüst |
ROSEN: RObust and SElective Non-repudiation (for TLS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCSW ![In: CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, Virtual Event, Republic of Korea, 15 November 2021, pp. 97-109, 2021, ACM, 978-1-4503-8653-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Jin Sun 0002, Xiaomin Yao, Shangping Wang, Ying Wu |
Non-Repudiation Storage and Access Control Scheme of Insurance Data Based on Blockchain in IPFS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 155145-155155, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Weidong Fang, Wei Chen 0036, Wuxiong Zhang, Jun Pei, Weiwei Gao, Guohui Wang |
Digital signature scheme for information non-repudiation in blockchain: a state of the art review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Wirel. Commun. Netw. ![In: EURASIP J. Wirel. Commun. Netw. 2020(1), pp. 56, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Umut Can Çabuk |
Non-Repudiation for VoIP Communication in UMTS and LTE Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2012.03670, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
24 | Meng Wang, Yihong Long 0002 |
SM9 Digital Signature with Non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 16th International Conference on Computational Intelligence and Security, CIS 2020, Nanning, China, November 27-30, 2020, pp. 356-361, 2020, IEEE, 978-1-6654-0445-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Junfeng Tian, Ruifang Guo, Xuan Jing |
Stern-Brocot-Based Non-Repudiation Dynamic Provable Data Possession. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 96686-96694, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Jingchen Yan, Yating Wang, Yuichi Goto, Jingde Cheng |
An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
C2SI ![In: Codes, Cryptology and Information Security - Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji, pp. 399-408, 2019, Springer, 978-3-030-16457-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Pol Van Aubel, Erik Poll, Joost Rijneveld |
Non-Repudiation and End-to-End Security for Electric-Vehicle Charging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISGT Europe ![In: 2019 IEEE PES Innovative Smart Grid Technologies Europe, ISGT-Europe 2019, Bucharest, Romania, September 29 - October 2, 2019, pp. 1-5, 2019, IEEE, 978-1-5386-8218-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | H. Kamdem Fezeu, Thomas Ndié Djotio, Rachid Oulad Haj Thami |
Approaching decentralized non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Ubiquitous Environ. ![In: EAI Endorsed Trans. Ubiquitous Environ. 4(13), pp. e2, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Boao Yuan, Jun Liu |
一种可靠的多方不可否认协议的逻辑分析方法 (Reliable Logic Analysis Method of Multi-party Non-repudiation Protocol). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 45(7), pp. 143-149, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Yifan Xu, Jun Zhu, Weidong Fang, Yufeng Zhao, Lei Huang |
Identity Authentication Scheme for Information Non-Repudiation in Blockchain: An Overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSDM ![In: Fuzzy Systems and Data Mining IV - Proceedings of FSDM 2018, Bangkok, Thailand, 16-19 November 2018., pp. 809-817, 2018, IOS Press, 978-1-61499-926-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | David Mendes, Irene Rodrigues 0001, César Fonseca, Manuel Lopes 0003, José Manuel García Alonso, Javier Berrocal |
Anonymized Distributed PHR Using Blockchain for Openness and Non-repudiation Guarantee. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TPDL ![In: Digital Libraries for Open Knowledge, 22nd International Conference on Theory and Practice of Digital Libraries, TPDL 2018, Porto, Portugal, September 10-13, 2018, Proceedings., pp. 381-385, 2018, Springer, 978-3-030-00065-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Kai-Oliver Detken, Marcel Jahnke, Malte Humann, Bernd Rollgen |
Integrity and Non-repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDAACS-SWS ![In: 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), Lviv, Ukraine, September 20-21, 2018, pp. 82-87, 2018, IEEE, 978-1-5386-9339-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun |
TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018, 2018, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
24 | David Mendes, Irene Pimenta Rodrigues, César Fonseca, Manuel José Lopes, José Manuel García Alonso, Javier Berrocal |
Anonymized Distributed PHR Using Blockchain for Openness and Non-Repudiation Guarantee. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EFMI-STC ![In: Decision Support Systems and Education - Help and Support in Healthcare, Special Topic Conference of the European Federation for Medical Informatics, EFMI-STC 2018, Zagreb, Croatia, 15-16 October 2018, pp. 170-174, 2018, IOS Press, 978-1-61499-920-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Soo-Kyung Eom, Hyang-Sook Lee, Seongan Lim |
On the Non-repudiation of Isogeny Based Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers, pp. 63-77, 2018, Springer, 978-3-030-20073-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Chin-Ling Chen, Mao-Lun Chiang, Chun-Cheng Peng, Chun-Hsin Chang, Qing-Ru Sui |
A secure mutual authentication scheme with non-repudiation for vehicular ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Syst. ![In: Int. J. Commun. Syst. 30(6), 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun |
TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 578, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
24 | Enrico Schiavone, Andrea Ceccarelli, Andrea Bondavalli |
Continuous Biometric Verification for Non-Repudiation of Remote Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, pp. 4:1-4:10, 2017, ACM, 978-1-4503-5257-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Selwyn Piramuthu |
RFID-Based Non-repudiation Protocols for Supply Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FNSS ![In: Future Network Systems and Security - Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedings, pp. 56-69, 2017, Springer, 978-3-319-65547-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | H. Kamdem Fezeu, Thomas Ndié Djotio, Rachid Oulad Haj Thami |
Safe and Irrefutable Decentralized Communication: Bringing Non-Repudiation to Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BDCA ![In: Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, BDCA 2017, Tetouan, Morocco, March 29-30, 2017, pp. 37:1-37:6, 2017, ACM, 978-1-4503-4852-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | C. S. Sreeja, Mohammed Misbahuddin |
An online signature method using DNA based bio-hash for positive identification and non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PKIA ![In: 2017 International Conference on Public Key Infrastructure and its Applications, PKIA 2017, Bengaluru, India, November 14-15, 2017, pp. 28-35, 2017, IEEE, 978-1-5386-2356-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Ahmed Shatnawi, Ethan V. Munson, Cheng Thao |
Maintaining Integrity and Non-Repudiation in Secure Offline Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DocEng ![In: Proceedings of the 2017 ACM Symposium on Document Engineering, DocEng 2017, Valletta, Malta, September 4-7, 2017, pp. 59-62, 2017, ACM, 978-1-4503-4689-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Huseyin Ugur Yildiz, Kemal Bicakci, Bülent Tavli, Hakan Gultekin, Davut Incebacak |
Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ad Hoc Networks ![In: Ad Hoc Networks 37, pp. 301-323, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Giuseppe Cattaneo, Luigi Catuogno, Fabio Petagna, Gianluca Roscigno |
Ensuring non-repudiation in human conversations over VoIP communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Distributed Syst. ![In: Int. J. Commun. Networks Distributed Syst. 16(4), pp. 315-334, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Chin-Ling Chen, Kai-Wen Cheng |
Design of a VANET privacy and non-repudiation accident reporting system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 9(18), pp. 5187-5202, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Xiaohong Li 0001, Jiayi Xu, Guangquan Xu, Jianye Hao, Xiaoru Li, Zhiyong Feng 0002, Honghao Gao |
Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Eng. Knowl. Eng. ![In: Int. J. Softw. Eng. Knowl. Eng. 26(4), pp. 563-586, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Enrico Schiavone, Andrea Ceccarelli, Andrea Bondavalli |
Continuous Authentication and Non-repudiation for the Security of Critical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 35th IEEE Symposium on Reliable Distributed Systems, SRDS 2016, Budapest, Hungary, September 26-29, 2016, pp. 207-208, 2016, IEEE Computer Society, 978-1-5090-3513-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Ömer Sever |
Pairing based non-repudiation protocols in cryptography ; Kriptografide eşleme tabanlı inkar edemezlik protokolleri. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2016 |
RDF |
|
24 | Jie Li 0002, Huang Lu, Mohsen Guizani |
ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 26(4), pp. 938-948, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Sasan Adibi |
A multilayer non-repudiation system: a Suite-B approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 8(9), pp. 1698-1706, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Martín A. Gagliotti Vigil, Johannes Buchmann 0001, Daniel Cabarcas, Christian Weinert, Alexander Wiesmaier |
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 50, pp. 16-32, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Emad Abd-Elrahman, Hatem Ibn-Khedher, Hossam Afifi, Thouraya Toukabri |
Fast group discovery and non-repudiation in D2D communications using IBE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: International Wireless Communications and Mobile Computing Conference, IWCMC 2015, Dubrovnik, Croatia, August 24-28, 2015, pp. 616-621, 2015, IEEE, 978-1-4799-5344-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Karl Christoph Ruland, Jochen Sassmannshausen |
Non-repudiation Services for the MMS Protocol of IEC 61850. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSR ![In: Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings, pp. 70-85, 2015, Springer, 978-3-319-27151-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Ali Fanian, Fariba Alamifar, Mehdi Berenjkoub |
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC Int. J. Inf. Secur. ![In: ISC Int. J. Inf. Secur. 6(2), pp. 141-153, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Stassia Resondry, Karima Boudaoud, Michel Kamel, Yoann Bertrand, Michel Riveill |
An alternative version of HTTPS to provide non-repudiation security property. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: International Wireless Communications and Mobile Computing Conference, IWCMC 2014, Nicosia, Cyprus, August 4-8, 2014, pp. 536-541, 2014, IEEE, 978-1-4799-7324-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Shi-Cho Cha 0001, Yuh-Jzer Joung, Yen-Chung Tseng, Shih-Chieh Huang, Guan-Heng Chen, Chih-Teng Tseng |
Ensuring the integrity and non-repudiation of remitting e-invoices in conventional channels with commercially available NFC devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2014, Las Vegas, NV, USA, June 30 - July 2, 2014, pp. 1-6, 2014, IEEE Computer Society, 978-1-4799-5604-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Maria Krotsiani, George Spanoudakis |
Continuous Certification of Non-repudiation in Cloud Storage Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014, pp. 921-928, 2014, IEEE Computer Society, 978-1-4799-6513-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Xixiang Lv, Hui Li 0006 |
Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 7(2), 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Yu-Chi Chen, Gwoboa Horng, Chao-Liang Liu |
Strong non-repudiation based on certificateless short signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 7(3), pp. 253-263, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Zhifeng Xiao, Yang Xiao 0001, David Hung-Chang Du |
Non-repudiation in neighborhood area networks for smart grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Mag. ![In: IEEE Commun. Mag. 51(1), pp. 18-26, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Jun Feng, Yu Chen 0002 |
A fair non-repudiation framework for data integrity in cloud storage services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Cloud Comput. ![In: Int. J. Cloud Comput. 2(1), pp. 20-47, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Wei Wu 0001, Jianying Zhou 0001, Yang Xiang 0001, Li Xu 0002 |
How to achieve non-repudiation of origin with privacy protection in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Syst. Sci. ![In: J. Comput. Syst. Sci. 79(8), pp. 1200-1213, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Liehuang Zhu, Dan Liu 0002, Litao Yu, Yuzhou Xie, Mingzhong Wang |
Content integrity and non-repudiation preserving audio-hiding scheme based on robust digital signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 6(11), pp. 1331-1343, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Johannes Braun 0001, Franziskus Kiefer, Andreas Hülsing |
Revocation and Non-repudiation: When the First Destroys the Latter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructures, Services and Applications - 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers, pp. 31-46, 2013, Springer, 978-3-642-53996-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Shin-Jia Hwang, Cheng-Han You |
A Delegation-Based Unlinkable Authentication Protocol for Portable Communication Systems with Non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMC/HumanCom ![In: Advanced Technologies, Embedded and Multimedia for Human-centric Computing - HumanCom and EMC 2013 [International Conference on Human-centric Computing, HumanCom 2013 / 8th International Conference on Embedded and Multimedia Computing, EMC 2013, Taipei, Taiwan, August 23-25, 2013], pp. 923-932, 2013, Springer, 978-94-007-7261-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Qiang Li, Kaigui Wu, Fang Li |
An Optimistic Non-repudiation Protocol Focused on Transparent Trusted Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC/EUC ![In: 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, HPCC/EUC 2013, Zhangjiajie, China, November 13-15, 2013, pp. 682-689, 2013, IEEE, 978-0-7695-5088-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Nour Zawawi, Rania El-Gohary, Mohamed Hamdy El-Eliemy, Mohamed Fahmy Tolba |
A Novel Watermarking Approach for Data Integrity and Non-repudiation in Rational Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMLTA ![In: Advanced Machine Learning Technologies and Applications - First International Conference, AMLTA 2012, Cairo, Egypt, December 8-10, 2012. Proceedings, pp. 532-542, 2012, Springer, 978-3-642-35325-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Yatao Yang, Burkhard Stiller |
A non-repudiation scheme for user postings based on BAC in Mesh networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: 2012 IEEE Network Operations and Management Symposium, NOMS 2012, Maui, HI, USA, April 16-20, 2012, pp. 1187-1190, 2012, IEEE, 978-1-4673-0267-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Rainer Schick, Christoph Ruland |
Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 387-390, 2012, SciTePress, 978-989-8565-24-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
24 | Rainer Schick, Christoph Ruland |
On the Security of the Non-Repudiation of Forwarding Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business - 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings, pp. 167-178, 2012, Springer, 978-3-642-32286-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Chung-Ming Ou, Chung-Ren Ou |
Adaptation of agent-based non-repudiation protocol to mobile digital right management (DRM). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 38(9), pp. 11048-11054, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Chun-I Fan, Ruei-Hau Hsu, Pei-Hsiu Ho |
Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 27(3), pp. 969-982, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
24 | Panagiota Lagou, Gregory Chondrokoukis |
Biometrics for non-repudiation: security and legal aspect. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Biom. ![In: Int. J. Biom. 3(2), pp. 128-147, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Jun Feng, Yu Chen 0002, Douglas H. Summerville |
A fair multi-party non-repudiation scheme for storage clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CTS ![In: 2011 International Conference on Collaboration Technologies and Systems, CTS 2011, Philadelphia, Pennsylvania, USA, May 23-27, 2011, pp. 457-465, 2011, IEEE, 978-1-61284-636-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Abdesselam Redouane |
Towards a Calculus for Non Repudiation Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 383-386, 2011, SciTePress, 978-989-8425-71-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
24 | Wojciech Jamroga, Sjouke Mauw, Matthijs Melissen |
Fairness in Non-Repudiation Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STM ![In: Security and Trust Management - 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers, pp. 122-139, 2011, Springer, 978-3-642-29962-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Jun Feng, Yu Chen 0002, Douglas H. Summerville, Wei-Shinn Ku, Zhou Su |
Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 2011 IEEE Consumer Communications and Networking Conference, CCNC 2011, Las Vegas, NV, 9-12 January, 2011, pp. 521-522, 2011, IEEE, 978-1-4244-8789-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Stephen W. Neville, Michael Horie |
Efficiently Achieving Full Three-Way Non-repudiation in Consumer-Level eCommerce and M-Commerce Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011, pp. 664-672, 2011, IEEE Computer Society, 978-1-4577-2135-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Chunling Wang, Fei Yang |
An Interactive Charge Scheme with Reward and Non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Seventh International Conference on Computational Intelligence and Security, CIS 2011, Sanya, Hainan, China, December 3-4, 2011, pp. 707-711, 2011, IEEE Computer Society, 978-1-4577-2008-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Mohammad Torabi Dashti, Jan Cederquist, Yanjing Wang 0001 |
Risk Balance in Optimistic Non-repudiation Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects of Security and Trust - 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers, pp. 263-277, 2011, Springer, 978-3-642-29419-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Jianying Zhou 0001 |
Non-Repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Financial Cryptography and Security ![In: Handbook of Financial Cryptography and Security., pp. 83-108, 2010, Chapman and Hall/CRC, 978-1-4200-5981-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Jing Liu, Laurent Vigneron |
Design and verification of a non-repudiation protocol based on receiver-side smart card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 4(1), pp. 15-29, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Bogdan Ksiezopolski, Zbigniew Kotulski |
Middleware non-repudiation service for the data warehouse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. UMCS Informatica ![In: Ann. UMCS Informatica 10(1), pp. 131-144, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Kamel Adi, Liviu Pene, L. Sullivan |
Games for non-repudiation protocol correctness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Wirel. Mob. Comput. ![In: Int. J. Wirel. Mob. Comput. 4(4), pp. 305-313, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Sasan Adibi |
A remote interactive non-repudiation multimedia-based m-learning system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telematics Informatics ![In: Telematics Informatics 27(4), pp. 377-393, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Mayla Brusò, Agostino Cortesi |
Non-repudiation analysis using LySa with annotations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Lang. Syst. Struct. ![In: Comput. Lang. Syst. Struct. 36(4), pp. 352-377, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Sasan Adibi |
An application layer non-repudiation wireless system: A cross-layer approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 11th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM 2010, Montreal, QC, Canada, 14-17 June, 2010, pp. 1-2, 2010, IEEE Computer Society, 978-1-4244-7263-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Jun Feng, Yu Chen 0002, Wei-Shinn Ku, Pu Liu |
Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 39th International Conference on Parallel Processing, ICPP Workshops 2010, San Diego, California, USA, 13-16 September 2010, pp. 251-258, 2010, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | S. A. Thorat, M. Chatterjee |
Implementation of message layer protocol with non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWET ![In: Proceedings of the ICWET '10 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 26 - 27, 2010, pp. 448-450, 2010, ACM, 978-1-60558-812-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Purvi Tandel, Sharada Valiveti, K. P. Agrawal, Ketan Kotecha |
Non-Repudiation in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGIT-FGCN (2) ![In: Communication and Networking - International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part II, pp. 405-415, 2010, Springer, 978-3-642-17603-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Sasan Adibi |
An Application Layer Non-Repudiation Wireless System: A Cross-Layer Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2010 |
RDF |
|
24 | Tran Khanh Dang, Thi Thanh Huyen Phan |
An Extended Payment Model for M-Commerce with Fair Non-Repudiation Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Polibits ![In: Polibits 40, pp. 63-70, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta |
A New Fair Non-repudiation Protocol for Secure Negotiation and Contract Signing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Univers. Comput. Sci. ![In: J. Univers. Comput. Sci. 15(3), pp. 555-583, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Jose Antonio Onieva, Javier López 0001, Jianying Zhou 0001 |
Secure Multi-Party Non-Repudiation Protocols and Applications ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2009 |
DOI RDF |
|
24 | Damian Rusinek, Bogdan Ksiezopolski |
Voter non-repudiation oriented scheme for the medium scale e-voting protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMCSIT ![In: Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2009, Mragowo, Poland, 12-14 October 2009, pp. 325-330, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Xi Wang, Xiangming Wen, Ye Liu, Xinqi Lin, Ying Wang |
A fair non-repudiation security protocol with off-line TTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOLI ![In: 2009 IEEE/INFORMS International Conference on Service Operations, Logistics and Informatics, SOLI 2009, Chicago, IL, USA, July 22-24, 2009, pp. 173-178, 2009, IEEE, 978-1-4244-3540-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Yishi Zhao, Nigel Thomas |
Comparing Methods for the Efficient Analysis of PEPA Models of Non-repudiation Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 15th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2009, Shenzhen, China, December 8-11, 2009, pp. 821-827, 2009, IEEE Computer Society, 978-1-4244-5788-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Jaeduck Choi, Souhwan Jung |
A Security Framework with Strong Non-Repudiation and Privacy in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 6th IEEE Consumer Communications and Networking Conference, CCNC 2009, Las Vegas, NV, USA, 10-13 Jan., 2009, pp. 1-5, 2009, IEEE, 978-1-4244-2308-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Chung-Ming Ou, Chung-Ren Ou |
Adaptation of Agent-Based Non-Repudiation Protocol to Mobile DRM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings, pp. 861-864, 2009, IEEE Computer Society, 978-1-4244-4717-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Chung-Ming Ou, Chung-Ren Ou |
Non-repudiation Mechanism of Agent-based Mobile Payment Systems: Perspectives on Wireless PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Univers. Comput. Sci. ![In: J. Univers. Comput. Sci. 14(14), pp. 2309-2328, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Berthold Agreiter, Michael Hafner, Ruth Breu |
A fair Non-repudiation service in a web services peer-to-peer environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 30(6), pp. 372-378, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Andrés Marín López, Daniel Díaz Sánchez, Florina Almenárez, Carlos García-Rubio, Celeste Campo |
Smart card-based agents for fair non-repudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 51(9), pp. 2288-2298, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Francis Klay, Judson Santiago, Laurent Vigneron |
Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0710.3305, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
24 | Nicolai Kuntze, Andreas U. Schmidt, Christian Hett |
Non-Repudiation in Internet Telephony ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/cs/0701145, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
24 | Thi Thanh Huyen Phan, Tran Khanh Dang |
An Extended Payment Model with Fair Non-Repudiation Protocols for M-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: MoMM'2007 - The Fifth International Conference on Advances in Mobile Computing and Multimedia, 3-5 December 2007, Jakarta, Indonesia, pp. 227-232, 2007, Austrian Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
Displaying result #101 - #200 of 435 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ >>] |
|