Results 1 - 10
of
731
Non-Repudiation
, 2009
"... These doctoral studies were conducted under the supervision of Dr. Mick Ganley ..."
Abstract
- Add to MetaCart
These doctoral studies were conducted under the supervision of Dr. Mick Ganley
Evidence and Non-repudiation
- JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
, 1997
"... The ultimate purpose of a non-repudiation service is to resolve disputes about the occurrence or non-occurrence of a claimed event or action. Dispute resolution relies on the evidence held by the participants. This paper discusses types of non-repudiation evidence, elements of non-repudiation evide ..."
Abstract
-
Cited by 42 (5 self)
- Add to MetaCart
The ultimate purpose of a non-repudiation service is to resolve disputes about the occurrence or non-occurrence of a claimed event or action. Dispute resolution relies on the evidence held by the participants. This paper discusses types of non-repudiation evidence, elements of non-repudiation
Observations on Non-repudiation
- Journal of Network and Computer Applications
, 1996
"... . This paper discusses non-repudiation services regarding the transfer of a message and classifies the roles of trusted third parties involved in non-repudiation services. We examine the selective receipt problem and the generation of time evidence, analyse the current state of the ISO/IEC 13888 dra ..."
Abstract
-
Cited by 36 (5 self)
- Add to MetaCart
. This paper discusses non-repudiation services regarding the transfer of a message and classifies the roles of trusted third parties involved in non-repudiation services. We examine the selective receipt problem and the generation of time evidence, analyse the current state of the ISO/IEC 13888
A Fair Non-repudiation Protocol
"... A fair non-repudiation protocol should not give the sender of a message an advantage over the receiver, or vice versa. We will present a fair non-repudiation protocol that requires a Trusted Third Party but attempts to minimize its involvement in the execution of the protocol. We will draw particula ..."
Abstract
-
Cited by 175 (16 self)
- Add to MetaCart
A fair non-repudiation protocol should not give the sender of a message an advantage over the receiver, or vice versa. We will present a fair non-repudiation protocol that requires a Trusted Third Party but attempts to minimize its involvement in the execution of the protocol. We will draw
An Efficient Non-repudiation Protocol
- IN PCSFW: PROCEEDINGS OF THE 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP. IEEE COMPUTER
, 1997
"... Fairness may be a desirable property of a nonrepudiation service. Protocols can achieve fairness through the involvement of a trusted third party but the extent of the trusted third party's involvement can vary between protocols. Hence, one of the goals of designing an efficient non-repudiation ..."
Abstract
-
Cited by 50 (3 self)
- Add to MetaCart
Fairness may be a desirable property of a nonrepudiation service. Protocols can achieve fairness through the involvement of a trusted third party but the extent of the trusted third party's involvement can vary between protocols. Hence, one of the goals of designing an efficient non-repudiation
Observations on Non-repudiation
- Journal of Network and Computer Applications
, 1996
"... . This paper discusses non-repudiation services regarding the transfer of a message and classifies the roles of trusted third parties involved in non-repudiation services. We examine the selective receipt problem and the generation of time evidence, analyse the current state of the ISO/IEC 13888 ..."
Abstract
- Add to MetaCart
. This paper discusses non-repudiation services regarding the transfer of a message and classifies the roles of trusted third parties involved in non-repudiation services. We examine the selective receipt problem and the generation of time evidence, analyse the current state of the ISO
Non-Repudiation Analysis with LYSA ∗
"... Abstract This work introduces a formal analysis of the non-repudiation property for security protocols. Protocols are modelled in the process calculus LYSA, using an extended syntax with annotations. Non-repudiation is verified using a Control Flow Analysis, following the same approach of M. Buchhol ..."
Abstract
- Add to MetaCart
Abstract This work introduces a formal analysis of the non-repudiation property for security protocols. Protocols are modelled in the process calculus LYSA, using an extended syntax with annotations. Non-repudiation is verified using a Control Flow Analysis, following the same approach of M
Non-Repudiation in Internet Telephony
"... Summary. We present a concept to achieve non-repudiation for natural language conversations over the Internet. The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication. It establishes the integrity and authenticity of the bidirectional data st ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Summary. We present a concept to achieve non-repudiation for natural language conversations over the Internet. The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication. It establishes the integrity and authenticity of the bidirectional data
Fairness in non-repudiation protocols
- In Proc. of STM. LNCS 7170
, 2012
"... Abstract. We indicate two problems with the specifications of fairness that are currently used for the verification of non-repudiation and other fair-exchange protocols. The first of these problems is the implicit as-sumption of perfect information. The second problem is the possible lack of effecti ..."
Abstract
-
Cited by 6 (2 self)
- Add to MetaCart
Abstract. We indicate two problems with the specifications of fairness that are currently used for the verification of non-repudiation and other fair-exchange protocols. The first of these problems is the implicit as-sumption of perfect information. The second problem is the possible lack
An Intensive Survey of Non-Repudiation Protocols
- COMPUTER COMMUNICATIONS
, 2002
"... With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Non-repudiation services must ensure that when Alice sends some information to Bob over a network, neither Alice nor Bob can deny having partici ..."
Abstract
-
Cited by 27 (0 self)
- Add to MetaCart
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Non-repudiation services must ensure that when Alice sends some information to Bob over a network, neither Alice nor Bob can deny having
Results 1 - 10
of
731