Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
24 | Berthold Agreiter, Michael Hafner, Ruth Breu |
A Fair Non-repudiation Service in a Web Services Peer-to-Peer Environment. |
WOSIS |
2007 |
DBLP BibTeX RDF |
|
24 | Xueming Wang, Xiang Li |
Game-Based Analysis of Multi-Party Non-Repudiation Protocols. |
CIS |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Chou Chen Yang, Ya-Wen Yang, Wei-Ting Liu |
A Robust Authentication Protocol with Non-Repudiation Service for Integrating WLAN and 3G Network. |
Wirel. Pers. Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Hongyan Peng, Xiaojian Li, Chunhe Xia, Jianfeng Deng, Xiaofa Zhou |
A Non-Repudiation Protocol for E-Mail and Its Formal Analysis. |
J. Comput. Res. Dev. |
2006 |
DBLP BibTeX RDF |
|
24 | Christian Hett, Nicolai Kuntze, Andreas U. Schmidt |
Security and Non-Repudiation for Voice-Over-IP Conversations |
CoRR |
2006 |
DBLP BibTeX RDF |
|
24 | Guilin Wang |
Generic non-repudiation protocols supporting transparent off-line TTP. |
J. Comput. Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Gregory Vert, Manaf Alfize |
An Enhanced Pretty Good Privacy (EPGP) System with Mutual Non-Repudiation. |
Security and Management |
2006 |
DBLP BibTeX RDF |
|
24 | Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner |
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta |
A new fair non-repudiation protocol for secure negotiation and contract signing. |
PST |
2006 |
DBLP DOI BibTeX RDF |
abuse freeness, contract negotiation, contract signing protocol, security, e-commerce, confidentiality, fair-exchange |
24 | Da-Zhi Sun, Zhen-Fu Cao |
Improved public key authentication scheme for non-repudiation. |
Appl. Math. Comput. |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Seokwon Yang, Stanley Y. W. Su, Herman Lam |
A non-repudiation message transfer protocol for collaborative e-commerce. |
Int. J. Bus. Process. Integr. Manag. |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Richard W. C. Lui, Siu-Ming Yiu, Lucas Chi Kwong Hui |
Efficient Authorization in Delegation Chains with Strong Non-Repudiation. |
IWAP |
2005 |
DBLP BibTeX RDF |
|
24 | Guilin Wang |
Generic Fair Non-Repudiation Protocols with Transparent Off-line TTP. |
IWAP |
2005 |
DBLP BibTeX RDF |
|
24 | Yuan Ding, Guo Tao, Pingzhi Fan |
The design and analysis of an electronic evidence and non-repudiation protocol. |
ISADS |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Michael Roe |
Non-repudiation and the Metaphysics of Presence. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Michael Roe |
Non-repudiation and the Metaphysics of Presence. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Yi-Chi Lin, Jill Slay |
Non-Repudiation in Pure Mobile Ad Hoc Network. |
AISM |
2005 |
DBLP BibTeX RDF |
|
24 | Hasan, Burkhard Stiller |
Non-repudiation of consumption of mobile Internet services with privacy support. |
WiMob (2) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | J. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti |
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina |
Automatic Analysis of a Non-Repudiation Protocol. |
QAPL |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Jose Antonio Onieva, Jianying Zhou 0001, Javier López 0001 |
Non-repudiation protocols for multiple entities. |
Comput. Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Jose Antonio Onieva, Jianying Zhou 0001, Javier López 0001, Mildrey Carbonell |
Agent-mediated non-repudiation protocols. |
Electron. Commer. Res. Appl. |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Ana Isabel González-Tablas Ferreres, Karel Wouters, Benjamín Ramos Álvarez |
Teaching X.509/PKIX Based Digital Signatures While Enhancing Non-Repudiation of a Web Based Assessment System. |
ICWI |
2004 |
DBLP BibTeX RDF |
|
24 | Botao Li, Junzhou Luo |
On timeliness of a fair non-repudiation protocol. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Sungwoo Tak, Yugyung Lee, Eun Kyo Park |
A software framework for non-repudiation service in electronic commerce based on the Internet. |
Microprocess. Microsystems |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Ronggong Song, Larry Korba |
Pay-TV system with strong privacy and non-repudiation protection. |
IEEE Trans. Consumer Electron. |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Steve Kremer, Jean-François Raskin |
A Game-based Verification of Non-repudiation and Fair Exchange Protocols. |
J. Comput. Secur. |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Padmanabhan Krishnan, Robert Bannerman |
User Assisted Verification of Non-Repudiation and Similar Properties. |
Security and Management |
2003 |
DBLP BibTeX RDF |
|
24 | Jose Antonio Onieva, Jianying Zhou 0001, Mildrey Carbonell, Javier López 0001 |
A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages. |
SEC |
2003 |
DBLP BibTeX RDF |
|
24 | Jing-Jang Hwang, Min-Hua Shao, Soushan Wu |
Establishing Chain of Evidence as a Base for Non-Repudiation Services. |
SEC |
2003 |
DBLP BibTeX RDF |
|
24 | Aleksandra Nenadic, Ning Zhang 0001 |
Non-Repudiation and Fairness in Electronic Data Exchange. |
ICEIS (4) |
2003 |
DBLP BibTeX RDF |
|
24 | Xianxian Li, Jinpeng Huai |
Efficient Non-Repudiation Multicast Source Authentication Schemes. |
J. Comput. Sci. Technol. |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Steve Kremer, Olivier Markowitch, Jianying Zhou 0001 |
An intensive survey of fair non-repudiation protocols. |
Comput. Commun. |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Tomás Rosa |
Key-collisions in (EC)DSA: Attacking Non-repudiation. |
IACR Cryptol. ePrint Arch. |
2002 |
DBLP BibTeX RDF |
|
24 | Wensheng Zhou, Troy Rockwood, Phoom Sagetong |
Non-repudiation oblivious watermarking schema for secure digital video distribution. |
IEEE Workshop on Multimedia Signal Processing |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Bo Meng, Shaomei Wang, Qianxing Xiong |
A Fair Non-Repudiation Protocol. |
CSCWD |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Jianying Zhou 0001 |
Non-Repudiation in Electronic Commerce. |
DEXA Workshops |
2002 |
DBLP BibTeX RDF |
|
24 | Sungwoo Tak, Yugyung Lee, Eun Kyo Park |
A software framework for non-repudiation service in electronic commerce based on the Internet. |
ICCCN |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Ronggong Song, Michael R. Lyu |
Analysis of privacy and non-repudiation on pay-TV systems. |
IEEE Trans. Consumer Electron. |
2001 |
DBLP DOI BibTeX RDF |
|
24 | L. Harn, H. Y. Lin |
A non-repudiation metering scheme. |
IEEE Commun. Lett. |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Lawrence C. Paulson |
A Proof of Non-repudiation (Transcript of Discussion). |
Security Protocols Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Panagiotis Louridas |
Some guidelines for non-repudiation protocols. |
Comput. Commun. Rev. |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Adrian McCullagh, William J. Caelli |
Non-Repudiation in the Digital Environment. |
First Monday |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Nam-Yih Lee, Chi-Chao Chang, Chun-Li Lin, Tzonelih Hwang |
Privacy and non-repudiation on pay-TV systems. |
IEEE Trans. Consumer Electron. |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Birgit Pfitzmann, Ahmad-Reza Sadeghi |
Anonymous Fingerprinting with Direct Non-Repudiation. |
IACR Cryptol. ePrint Arch. |
2000 |
DBLP BibTeX RDF |
|
24 | Steve Kremer, Olivier Markowitch |
A Multi-Party Non-Repudiation Protocol. |
SEC |
2000 |
DBLP BibTeX RDF |
|
24 | Jerrold F. Stach, Eun Kyo Park, Kia Makki |
Performance of an enhanced GSM protocol supporting non-repudiation of service. |
Comput. Commun. |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Jianying Zhou 0001, Kwok-Yan Lam |
Securing digital signatures for non-repudiation. |
Comput. Commun. |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Malleswar Kalla, Johnny S. K. Wong, Armin R. Mikler, Stephen Elbert |
Achieving non-repudiation of Web based transactions. |
J. Syst. Softw. |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Cheng-Hwee You, Jianying Zhou 0001, Kwok-Yan Lam |
On the efficient implementation of fair non-repudiation. |
Comput. Commun. Rev. |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Steve A. Schneider |
Formal Analysis of a Non-Repudiation Protocol. |
CSFW |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Jianying Zhou 0001 |
Non-repudiation. |
|
1997 |
RDF |
|
24 | Tom Coffey, Puneet Saidha |
Non-repudiation with mandatory proof of receipt. |
Comput. Commun. Rev. |
1996 |
DBLP DOI BibTeX RDF |
|
24 | Ning Zhang, Qi Shi 0001 |
Achieving Non-Repudiation of Receipt. |
Comput. J. |
1996 |
DBLP DOI BibTeX RDF |
|
24 | Yongfei Han |
Investigation of non-repudiation protocols. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
24 | R. Taylor |
Non-repudiation without public-key. |
ACISP |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Moni Naor |
Deniable Ring Authentication. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng |
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Antoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer |
Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications. |
TrustBus |
2004 |
DBLP DOI BibTeX RDF |
Pay-per-view systems, multicast, electronic payments |
15 | Wei Gao 0007, Xueli Wang, Dongqing Xie |
Chameleon Hashes Without Key Exposure Based on Factoring. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
chameleon signature, key-exposure, chameleon hash |
15 | Xiaofeng Chen 0001, Fangguo Zhang, Kwangjo Kim |
Chameleon Hashing Without Key Exposure. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Byoungcheon Lee, Heesun Kim, Kwangjo Kim |
Secure Mobile Agent Using Strong Non-designated Proxy Signature. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
Secure mobile agent, strong non-designated proxy signature, multi-proxy signature |
14 | Wei Zhao, Dingfeng Ye |
Modified Huang-Wang's Convertible Nominative Signature Scheme. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Yaling Zhang, Jing Zhang, Yikun Zhang |
Multi-signers Strong Designated Verifier Signature Scheme. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
Multi-signers, Designated Verifier Signature |
14 | Nick Cook, Paul Robinson, Santosh K. Shrivastava |
The Rigorous Implementation of a Fair Exchange Protocol for Non-repudiable Web Service Interactions - a case study. |
ICDE Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Carole Bassil, Ahmed Serhrouchni, Nicolas Rouhana |
Critical Analysis and New Perspective for Securing Voice Networks. |
ICN (2) |
2005 |
DBLP DOI BibTeX RDF |
VoIP, GSM, Security mechanisms, SRTP |
14 | Jianhong Zhang, Jiancheng Zou, Yumin Wang |
A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
|
14 | John M. Boyer |
Bulletproof business process automation: securing XML forms with document subset signatures. |
XML Security |
2003 |
DBLP DOI BibTeX RDF |
XFDL, XML signature transforms, secure XML forms, XForms |
14 | Nick Cook, Santosh K. Shrivastava, Stuart M. Wheater |
Middleware Support for Non-repudiable Transactional Information Sharing between Enterprises. |
DAIS |
2003 |
DBLP DOI BibTeX RDF |
inter-enterprise interaction, security, middleware, transactions |
14 | Aggelos Kiayias, Moti Yung |
Breaking and Repairing Asymmetric Public-Key Traitor Tracing. |
Digital Rights Management Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
14 | K. Shum, Victor K. Wei |
A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection. |
WETICE |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Kazumasa Omote, Atsuko Miyaji |
An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees. |
ISW |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Emmanouil Magkos, Mike Burmester, Vassilios Chrissikopoulos |
An Equitably Fair On-line Auction Scheme. |
EC-Web |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Jan Van Auseloos |
Technical Security: The Starting Point. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
12 | Benoît Libert, Moti Yung |
Dynamic fully forward-secure group signatures. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
key protection, anonymity, security modeling, group signatures, forward security, key exposure |
12 | Lein Harn, Jian Ren 0001, Changlu Lin |
Efficient identity-based GQ multisignatures. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
ISO/IEC standard, Public-key cryptography, Identity-based signature, Multisignature |
12 | Chung-Ming Ou, Chung-Ren Ou |
Security of Intelligent Agents in the Web-Based Applications. |
Intelligent Agents in the Evolution of Web and Applications |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Walter J. Scheirer, Terrance E. Boult |
Bipartite Biotokens: Definition, Implementation, and Analysis. |
ICB |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Feng Tian, Xiao-bing Han, Ying Wei |
Application and Research of Mobile E-commerce Security Based on WPKI. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Vijay Laxmi, Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur |
Buyer seller watermarking protocol for digital rights management. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
buyer-seller protocol, unbinding., watermark, digital rights management, certificate authority, piracy |
12 | Cong Tang, Ruichuan Chen, Zhuhua Cai, Anmin Xie, Jian-bin Hu, Liyong Tang, Zhong Chen 0001 |
Securing key issuing in peer-to-peer networks. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar, Samar Sen-Sarma |
An internet-based IP protection scheme for circuit designs using linear feedback shift register (LFSR)-based locking. |
SBCCI |
2009 |
DBLP DOI BibTeX RDF |
intellectual property protection (IPP), watermarking, encryption, decryption |
12 | Arne Tauber |
Requirements for Electronic Delivery Systems in eGovernment - An Austrian Experience. |
I3E |
2009 |
DBLP DOI BibTeX RDF |
Registered Mail, Certified Mail, Electronic Delivery, eGovernment |
12 | David J. Boyd |
TLS client handshake with a payment card. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Bo Zhang 0020, Qiuliang Xu |
Certificateless Proxy Blind Signature Scheme from Bilinear Pairings. |
WKDD |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Mohsen Toorani, Ali Asghar Beheshti Shirazi |
A directly public verifiable signcryption scheme based on elliptic curves. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Yunpu Zhu, Jacqueline E. Rice |
A Lightweight Architecture for Secure Two-Party Mobile Payment. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh |
An empirical evaluation of information security awareness levels in designing secure business processes. |
DESRIST |
2009 |
DBLP DOI BibTeX RDF |
secure business process, secure process design, situational awareness, design science, security awareness, information systems security |
12 | S. Britto R. Kumar, S. Albert Rabara, J. Ronald Martin |
MPCS: a secure Mobile Payment Consortia System for higher educational institutions. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
mobile payment consortia, secured transactions, software architecture, framework, mobile payment |
12 | Asmidar Abu Bakar, Roslan Ismail, Abdul Rahim Ahmad, Jamalul-lail Ab Manan, Jamilin Jais |
Group based access control scheme (GBAC): Keeping information sharing secure in mobile Ad- hoc environment. |
ICDIM |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Ki-Woong Park, Sang Seok Lim, Kyu Ho Park |
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices. |
IEEE Trans. Computers |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Network-level security and protection |
12 | Arjan Durresi, Mimoza Durresi, Leonard Barolli |
Secure Ubiquitous Health Monitoring System. |
NBiS |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Haowen Chan, Adrian Perrig |
Efficient security primitives derived from a secure aggregation algorithm. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
public key management, sensor networks, authentication, integrity, broadcast, signatures, data aggregation |
12 | Manuel Barbosa, Pooya Farshim |
Certificateless signcryption. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
insider security, signcryption, certificateless |
12 | Anish Arora |
Keynote: Primitives for Physical Trust. |
SSS |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Huaqun Wang, Hong Yu |
Cryptanalysis of Two Ring Signcryption Schemes. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Ring signcryption, privacy and trust, cryptanalysis, certificateless cryptography |
12 | Yang Xu 0021, Xiaoyao Xie |
Analysis of Electronic Commerce Protocols Based on Extended Rubin Logic. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Duc-Phong Le, Alexis Bonnecaze, Alban Gabillon |
A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper). |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
Timestamping scheme, Chameleon hash function, Absolute timestamp, Merkle tree |
12 | Mark Hartong, Rajni Goel, Duminda Wijesekera |
Protection and Recovery of Railroad Event Recorder Data. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2008 |
DBLP DOI BibTeX RDF |
Event data recorders, railroad accident investigations, secret shares |
12 | Mohsen Toorani, Ali Asghar Beheshti Shirazi |
SSMS - A secure SMS messaging protocol for the m-payment systems. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|