Observations on non-repudiation

被引:0
|
作者
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Evidence and non-repudiation
    Zhou, JY
    Gollmann, D
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 1997, 20 (03) : 267 - 281
  • [2] A proof of non-repudiation
    Bella, G
    Paulson, LC
    SECURITY PROTOCOLS, 2002, 2467 : 119 - 125
  • [3] Evidence and non-repudiation
    National University, Singapore, Singapore
    不详
    J Network Comput Appl, 3 (267-281):
  • [4] An efficient non-repudiation protocol
    Zhou, JY
    Gollmann, D
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 126 - 132
  • [5] A fair non-repudiation protocol
    Meng, B
    Wang, SM
    Xiong, QX
    PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON CSCW IN DESIGN, 2002, : 68 - 73
  • [6] A Fair Non-Repudiation Protocol
    Meng, B. (mengbo@263.net.cn), FAPERJ; SBC; UFRI; IEEE; COPPETEC FUNDACAO (Institute of Electrical and Electronics Engineers Inc.):
  • [7] Achieving non-repudiation of receipt
    Zhang, N
    Shi, Q
    COMPUTER JOURNAL, 1996, 39 (10): : 844 - 853
  • [8] Non-repudiation Analysis with LYSA
    Bruso, Mayla
    Cortesi, Agostino
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST, 2009, 297 : 318 - 329
  • [9] Intermediary non-repudiation protocols
    Onieva, JA
    Zhou, JY
    Carbonell, M
    Lopez, J
    IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE, 2003, : 207 - 214
  • [10] Non-repudiation and the metaphysics of presence
    Roe, Michael
    SECURITY PROTOCOLS, 2007, 4631 : 204 - 206