Fair non-repudiation protocol and its formal analysis

被引:0
|
作者
Liu, Jing [1 ]
Zhou, Ming-Tian [1 ]
机构
[1] Sch. of Comp. Sci. and Eng., Univ. of Electron. Sci. and Technol., Chengdu 610054, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
7
引用
收藏
页码:1422 / 1425
相关论文
共 50 条
  • [1] Fair non-repudiation cryptographic protocol and its formal analysis and applications
    Lin, X.X. (lixx@cscw.buaa.edu.cn), 1628, Chinese Academy of Sciences (11):
  • [2] A fair non-repudiation protocol
    Meng, B
    Wang, SM
    Xiong, QX
    PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON CSCW IN DESIGN, 2002, : 68 - 73
  • [3] Formal analysis of a non-repudiation protocol
    Schneider, S
    11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 54 - 65
  • [4] A Fair Non-Repudiation Protocol
    Meng, B. (mengbo@263.net.cn), FAPERJ; SBC; UFRI; IEEE; COPPETEC FUNDACAO (Institute of Electrical and Electronics Engineers Inc.):
  • [5] A fair non-repudiation protocol
    Zhou, JY
    Gollmann, D
    1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 55 - 61
  • [6] Formal analysis of non-repudiation protocol by spi
    Li, Yuan
    Jiang, Jian-Guo
    Wang, Huan-Bao
    Tongxin Xuebao/Journal on Communications, 2009, 30 (05): : 94 - 98
  • [7] Non-repudiation protocol for E-mail and its formal analysis
    Peng, Hongyan
    Li, Xiaojian
    Xia, Chunhe
    Deng, Jianfeng
    Zhou, Xiaofa
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2006, 43 (11): : 1914 - 1919
  • [8] Improvement of a fair non-repudiation protocol
    Wen, Jinghua
    Liang, Min
    Yang, Zirong
    Li, Xiang
    PROCEEDINGS OF E-ENGDET2006, 2006, : 70 - 74
  • [9] A Non-repudiation E-mail Transmission Protocol and Its Formal Analysis
    Ren, Zeming
    Xu, Lingyun
    Liu, Qian
    Fan, Andong
    PROGRESS IN MECHATRONICS AND INFORMATION TECHNOLOGY, PTS 1 AND 2, 2014, 462-463 : 984 - 988
  • [10] On the quest for impartiality: Design and analysis of a fair non-repudiation protocol
    Cederquist, J
    Corin, R
    Dashti, MT
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 27 - 39