A game-based verification of non-repudiation and fair exchange protocols

被引:12
|
作者
Kremer, Steve [1 ]
Raskin, Jean-François [1 ]
机构
[1] Departement d'Informatique, Faculté des Sciences, Universite Libre de Bruxelles, Bruxelles, Belgium
关键词
Alternating temporal logic - Alternating transition systems - Game based model - Game-based verification - Non-repudiation protocols;
D O I
10.3233/JCS-2003-11307
中图分类号
学科分类号
摘要
引用
收藏
页码:399 / 429
相关论文
共 50 条
  • [31] Extended-CSP based analysis of non-repudiation protocols
    School of Computer Science and Engineering, Southeast University, Nanjing 210096, China
    Tongxin Xuebao, 2008, 10 (8-18): : 8 - 18
  • [32] RFID-Based Non-repudiation Protocols for Supply Chains
    Piramuthu, Selwyn
    FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2017, 2017, 759 : 56 - 69
  • [33] A non-repudiation fair exchange protocol with semi-trusted third party
    2001, Huazhong University of Science and Technology (29):
  • [34] Fair non-repudiation protocol and its formal analysis
    Liu, Jing
    Zhou, Ming-Tian
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2003, 31 (09): : 1422 - 1425
  • [35] Non-repudiation and fairness in electronic data exchange
    Nenadic, A
    Zhang, N
    ENTERPRISE INFORMATION SYSTEMS V, 2004, : 286 - 293
  • [36] BPEL processes for non-repudiation protocols in Web Services
    Bilal, M
    Thomas, JP
    Harrington, P
    Abraham, A
    International Conference on Next Generation Web Services Practices, 2005, : 299 - 304
  • [37] A securely fair non-repudiation protocol with TTP load lightly
    Meng, B
    Xiong, QX
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : A13 - A17
  • [38] A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-Repudiation Proofs
    Grimm, Ruediger
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 49 - 56
  • [39] On the quest for impartiality: Design and analysis of a fair non-repudiation protocol
    Cederquist, J
    Corin, R
    Dashti, MT
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 27 - 39
  • [40] Continuous Biometric Verification for Non-Repudiation of Remote Services
    Schiavone, E.
    Ceccarelli, A.
    Bondavalli, A.
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,