Sciweavers

31 search results - page 1 / 7
» Intermediary Non-repudiation Protocols
Sort
View
WECWIS
2003
IEEE
125views ECommerce» more  WECWIS 2003»
13 years 10 months ago
A Non-Repudiation Message Transfer Protocol for E-commerce
In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security ...
Seokwon Yang, Stanley Y. W. Su, Herman Lam
CSFW
1998
IEEE
13 years 9 months ago
Formal Analysis of a Non-Repudiation Protocol
This paper applies the theory of Communicating Sequential Processes (CSP) to the modelling and analysis of a non-repudiation protocol. Non-repudiation protocols di er from authent...
Steve Schneider
ICPPW
1999
IEEE
13 years 9 months ago
Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol
We deal with two claws of Zhou-Gollmann's fair nonrepudiation protocol. Firstly, their protocol divides a message into 2 parts, i.e., a key K and a ciphertext C. Then, C is d...
Kwangjo Kim, Sangjoon Park, Joonsang Baek
CORR
2007
Springer
105views Education» more  CORR 2007»
13 years 4 months ago
Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder
Francis Klay, Judson Santiago, Laurent Vigneron
AINA
2007
IEEE
13 years 8 months ago
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices
PKI is generally considered as the most appropriate solution for e-commerce and mutual authentication, owing to its digital signature and non-repudiation features. Asymmetric key ...
Ki-Woong Park, Hyunchul Seok, Kyu Ho Park