共 50 条
- [42] RFID-Based Non-repudiation Protocols for Supply Chains FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2017, 2017, 759 : 56 - 69
- [43] Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder FORMAL ASPECTS IN SECURITY AND TRUST, 2009, 5491 : 192 - +
- [45] A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-Repudiation Proofs 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 49 - 56
- [47] A Fair Non-Repudiation Security Protocol with off-line TTP PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATION, LOGISTICS AND INFORMATICS, 2009, : 173 - +
- [49] An efficient non-repudiation protocol 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 126 - 132
- [50] An extended strand space method for fairness analysis of non-repudiation protocols Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2010, 44 (06): : 16 - 20