• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 731
Next 10 →

Non-Repudiation

by David John Boyd, David John Boyd, David J. Boyd , 2009
"... These doctoral studies were conducted under the supervision of Dr. Mick Ganley ..."
Abstract - Add to MetaCart
These doctoral studies were conducted under the supervision of Dr. Mick Ganley

Evidence and Non-repudiation

by Jianying Zhou, Dieter Gollmann - JOURNAL OF NETWORK AND COMPUTER APPLICATIONS , 1997
"... The ultimate purpose of a non-repudiation service is to resolve disputes about the occurrence or non-occurrence of a claimed event or action. Dispute resolution relies on the evidence held by the participants. This paper discusses types of non-repudiation evidence, elements of non-repudiation evide ..."
Abstract - Cited by 42 (5 self) - Add to MetaCart
The ultimate purpose of a non-repudiation service is to resolve disputes about the occurrence or non-occurrence of a claimed event or action. Dispute resolution relies on the evidence held by the participants. This paper discusses types of non-repudiation evidence, elements of non-repudiation

Observations on Non-repudiation

by Jianying Zhou, Dieter Gollmann - Journal of Network and Computer Applications , 1996
"... . This paper discusses non-repudiation services regarding the transfer of a message and classifies the roles of trusted third parties involved in non-repudiation services. We examine the selective receipt problem and the generation of time evidence, analyse the current state of the ISO/IEC 13888 dra ..."
Abstract - Cited by 36 (5 self) - Add to MetaCart
. This paper discusses non-repudiation services regarding the transfer of a message and classifies the roles of trusted third parties involved in non-repudiation services. We examine the selective receipt problem and the generation of time evidence, analyse the current state of the ISO/IEC 13888

A Fair Non-repudiation Protocol

by Jianying Zhou, Dieter Gollmann
"... A fair non-repudiation protocol should not give the sender of a message an advantage over the receiver, or vice versa. We will present a fair non-repudiation protocol that requires a Trusted Third Party but attempts to minimize its involvement in the execution of the protocol. We will draw particula ..."
Abstract - Cited by 175 (16 self) - Add to MetaCart
A fair non-repudiation protocol should not give the sender of a message an advantage over the receiver, or vice versa. We will present a fair non-repudiation protocol that requires a Trusted Third Party but attempts to minimize its involvement in the execution of the protocol. We will draw

An Efficient Non-repudiation Protocol

by Jianying Zhou, Dieter Gollmann - IN PCSFW: PROCEEDINGS OF THE 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP. IEEE COMPUTER , 1997
"... Fairness may be a desirable property of a nonrepudiation service. Protocols can achieve fairness through the involvement of a trusted third party but the extent of the trusted third party's involvement can vary between protocols. Hence, one of the goals of designing an efficient non-repudiation ..."
Abstract - Cited by 50 (3 self) - Add to MetaCart
Fairness may be a desirable property of a nonrepudiation service. Protocols can achieve fairness through the involvement of a trusted third party but the extent of the trusted third party's involvement can vary between protocols. Hence, one of the goals of designing an efficient non-repudiation

Observations on Non-repudiation

by Jianying Zhou And, Jianying Zhou, Dieter Gollmann - Journal of Network and Computer Applications , 1996
"... . This paper discusses non-repudiation services regarding the transfer of a message and classifies the roles of trusted third parties involved in non-repudiation services. We examine the selective receipt problem and the generation of time evidence, analyse the current state of the ISO/IEC 13888 ..."
Abstract - Add to MetaCart
. This paper discusses non-repudiation services regarding the transfer of a message and classifies the roles of trusted third parties involved in non-repudiation services. We examine the selective receipt problem and the generation of time evidence, analyse the current state of the ISO

Non-Repudiation Analysis with LYSA ∗

by Mayla Bruso ̀, Agostino Cortesi
"... Abstract This work introduces a formal analysis of the non-repudiation property for security protocols. Protocols are modelled in the process calculus LYSA, using an extended syntax with annotations. Non-repudiation is verified using a Control Flow Analysis, following the same approach of M. Buchhol ..."
Abstract - Add to MetaCart
Abstract This work introduces a formal analysis of the non-repudiation property for security protocols. Protocols are modelled in the process calculus LYSA, using an extended syntax with annotations. Non-repudiation is verified using a Control Flow Analysis, following the same approach of M

Non-Repudiation in Internet Telephony

by Nicolai Kuntze, Andreas U. Schmidt, Christian Hett
"... Summary. We present a concept to achieve non-repudiation for natural language conversations over the Internet. The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication. It establishes the integrity and authenticity of the bidirectional data st ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Summary. We present a concept to achieve non-repudiation for natural language conversations over the Internet. The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication. It establishes the integrity and authenticity of the bidirectional data

Fairness in non-repudiation protocols

by Wojciech Jamroga, Sjouke Mauw, Matthijs Melissen - In Proc. of STM. LNCS 7170 , 2012
"... Abstract. We indicate two problems with the specifications of fairness that are currently used for the verification of non-repudiation and other fair-exchange protocols. The first of these problems is the implicit as-sumption of perfect information. The second problem is the possible lack of effecti ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
Abstract. We indicate two problems with the specifications of fairness that are currently used for the verification of non-repudiation and other fair-exchange protocols. The first of these problems is the implicit as-sumption of perfect information. The second problem is the possible lack

An Intensive Survey of Non-Repudiation Protocols

by Steve Kremer, Olivier Markowitch, Jianying Zhou - COMPUTER COMMUNICATIONS , 2002
"... With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Non-repudiation services must ensure that when Alice sends some information to Bob over a network, neither Alice nor Bob can deny having partici ..."
Abstract - Cited by 27 (0 self) - Add to MetaCart
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Non-repudiation services must ensure that when Alice sends some information to Bob over a network, neither Alice nor Bob can deny having
Next 10 →
Results 1 - 10 of 731
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University