The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for repudiable with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2006 (17) 2007-2013 (16) 2014-2019 (18) 2020-2024 (9)
Publication types (Num. hits)
article(19) inproceedings(39) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 34 occurrences of 29 keywords

Results
Found 60 publication records. Showing 60 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
77Song Y. Yan, Carsten Maple, Glyn James A New Scheme for Deniable/Repudiable Authentication. Search on Bibsonomy CASC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Deniable/repudiable authentication, quadratic residuosity problem, intractability
67Paul Robinson, Nick Cook, Santosh K. Shrivastava Implementing Fair Non-repudiable Interactions with Web Services. Search on Bibsonomy EDOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Inter-enterprise collaboration and virtual enterprises, Middleware standards and systems, Security, Web services, Non-repudiation, Fair exchange, Enterprise computing
67Nick Cook, Paul Robinson, Santosh K. Shrivastava Component Middleware to Support Non-repudiable Service Interactions. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF FT Architecture/Middleware Software Engineering, Service Composition, Non-repudiation, System Security
51Willy Susilo, Yi Mu 0001 Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF repudiable, authentication, email, phishing, separable, ID-based, deniable
51Daniel W. Manchala Trust Metrics, Models and Protocols for Electronic Commerce Transactions. Search on Bibsonomy ICDCS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF trust protocols, trusted authority, fuzzy-verification, trusted advertisement, non-repudiable context, trust models, Trust metrics
47Nick Cook, Paul Robinson, Santosh K. Shrivastava The Rigorous Implementation of a Fair Exchange Protocol for Non-repudiable Web Service Interactions - a case study. Search on Bibsonomy ICDE Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Nick Cook, Santosh K. Shrivastava, Stuart M. Wheater Middleware Support for Non-repudiable Transactional Information Sharing between Enterprises. Search on Bibsonomy DAIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF inter-enterprise interaction, security, middleware, transactions
40Alapan Arnab, Andrew Hutchison Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Yuqing Ding, Zhongcheng Wu, Yongchun Miao, Liyang Xie, Manyu Ding Genuine On-Chain and Off-Chain Collaboration: Achieving Secure and Non-Repudiable File Sharing in Blockchain Applications. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Ziqiang Wen, Xiaomei Dong, Chongyang Yang, Ning Zhang Short Repudiable Ring Signature: Constant Size and Less Overhead. Search on Bibsonomy WISA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Kosei Akama, Seki Makino, Masaaki Sato, Keisuke Uehara Poster: Non-repudiable Secure Logging System for the Web. Search on Bibsonomy SACMAT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Hao Lin, Mingqiang Wang Repudiable ring signature: Stronger security and logarithmic-size. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Yue Zheng, Si Wang, Chip-Hong Chang A DNN Fingerprint for Non-Repudiable Model Ownership Identification and Piracy Detection. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Mattia Antonini, Miguel Pincheira, Massimo Vecchio, Fabio Antonelli A TinyML approach to non-repudiable anomaly detection in extreme industrial environments. Search on Bibsonomy MetroInd4.0& IoT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Fei Chen 0003, Jiahao Wang, Changkun Jiang, Tao Xiang 0001, Yuanyuan Yang 0001 Blockchain Based Non-repudiable IoT Data Trading: Simpler, Faster, and Cheaper. Search on Bibsonomy INFOCOM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Elliot Fairweather, Rudolf Wittner, Martin Chapman, Petr Holub, Vasa Curcin Non-repudiable Provenance for Clinical Decision Support Systems. Search on Bibsonomy IPAW The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Elliot Fairweather, Rudolf Wittner, Martin Chapman, Petr Holub, Vasa Curcin Non-repudiable provenance for clinical decision support systems. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
26Hao Lin, Mingqiang Wang Repudiable Ring Signature: Stronger Security and Logarithmic-Size. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
26 Repudiable Ring Signatures: Stronger Definitions and Logarithmic-Size. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
26Emanuel Palm, Olov Schelén, Ulf Bodin, Richard Hedman The Exchange Network: An Architecture for the Negotiation of Non-Repudiable Token Exchanges. Search on Bibsonomy INDIN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Dinuni K. Fernando, Siddharth Kulshrestha, Jerome Dinal Herath, Nitin Mahadik, Yanzhe Ma, Changxin Bai, Ping Yang 0002, Guanhua Yan, Shiyong Lu SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance. Search on Bibsonomy CIC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Feng Wang 0020, Li Xu 0002, Huaqun Wang, Zhide Chen Identity-based non-repudiable dynamic provable data possession in cloud storage. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Minseok Lee, Doo-Ho Choi, Taek-Young Youn Non-Repudiable Dynamic PDP with Stronger Security based on Stateful Rank Based Skip List. Search on Bibsonomy ICTC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Jiangtao Li 0003, Lei Zhang 0009 Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol. Search on Bibsonomy Inf. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Tsu-Yang Wu, Yuh-Min Tseng, Sen-Shan Huang, Yi-Chen Lai Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems. Search on Bibsonomy IEEE Access The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Karthik Nandakumar, Nalini K. Ratha, Sharath Pankanti, Shelby Darnell Secure one-time biometrie tokens for non-repudiable multi-party transactions. Search on Bibsonomy WIFS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Nikilesh Balakrishnan, Lucian Carata, Thomas Bytheway, Ripduman Sohan, Andy Hopper Non-repudiable disk I/O in untrusted kernels. Search on Bibsonomy APSys The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Hongyuan Wang, Liehuang Zhu, Chang Xu 0004, Yijia Lilong A universal method for realizing non-repudiable provable data possession in cloud storage. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Qing-Qing Xie, Liangmin Wang 0001, Hong Zhong 0001 Non-repudiable Query Answer Authentication Scheme over Anonymous Cloud Data. Search on Bibsonomy CBD The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Joona Kannisto, Takeshi Takahashi 0001, Jarmo Harju, Seppo Heikkinen, Marko Helenius, Shin'ichiro Matsuo, Bilhanan Silverajan A non-repudiable negotiation protocol for security service level agreements. Search on Bibsonomy Int. J. Commun. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26 Non-Repudiable Provable Data Possession in Cloud Storage. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
26Shouguo Chen, Anmin Fu, Ningyuan Qin 异构无线网络中基于自更新哈希链的不可否认性计费协议 (Non-repudiable Billing Protocol Based on Self-updating Hash Chain for Heterogeneous Wireless Networks). Search on Bibsonomy 计算机科学 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Zhen Mo, Yian Zhou, Shigang Chen, Cheng-Zhong Xu 0001 Enabling Non-repudiable Data Possession Verification in Cloud Storage Systems. Search on Bibsonomy IEEE CLOUD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Kissan G. Gauns Dessai, Venkatesh V. Kamat Fair and Non-repudiable Protocol for Exchange of E-examination Question Paper and Answer-Scripts. Search on Bibsonomy T4E The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Lei Pan 0002, Shaun Bangay Generating Repudiable, Memorizable, and Privacy Preserving Security Questions Using the Propp Theory of Narrative. Search on Bibsonomy CyberC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Samaneh Mashhadi A Novel Non-repudiable Threshold Proxy Signature Scheme with Known Signers. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2013 DBLP  BibTeX  RDF
26Alois Paulin, Tatjana Welzer A universal system for fair non-repudiable certified e-mail without a trusted third party. Search on Bibsonomy Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Samaneh Mashhadi Analysis of frame attack on Hsu et al.'s non-repudiable threshold multi-proxy multi-signature scheme with shared verification. Search on Bibsonomy Sci. Iran. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Kassidy P. Clark, Martijn Warnier, Frances M. T. Brazier Automated Non-repudiable Cloud Resource Allocation. Search on Bibsonomy CLOSER (Selected Papers) The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Raphael C.-W. Phan Non-repudiable authentication and billing architecture for wireless mesh networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Stephen W. Neville, Michael Horie Controlling spam and spear phishing via peered network overlays and non-repudiable traceback. Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Mohammad Hasan Samadani, Mehdi Shajari Mobile Partial Identity Management: The Non-repudiable Minimal Mobile Identity Model. Search on Bibsonomy FGIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Gang Li, Yanling Li, Chuanda Qi Analysis on a Non-repudiable Threshold Proxy Signature Scheme with Known Signers. Search on Bibsonomy ISNN (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Tulti-signature, Threshold proxy signature, Digital signature, Proxy signature
26Antonio Grillo, Alessandro Lentini, Gianluigi Me, Giuliano Rulli Trusted SMS - A Novel Framework for Non-repudiable SMS-based Processes. Search on Bibsonomy HEALTHINF (1) The full citation details ... 2008 DBLP  BibTeX  RDF
26Nick Cook, Paul Robinson, Santosh K. Shrivastava Design and Implementation of Web Services Middleware to Support Fair Non-Repudiable Interactions. Search on Bibsonomy Int. J. Cooperative Inf. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Nicholas Cook Middleware support for non-repudiable business-to-business interactions. Search on Bibsonomy 2006   RDF
26Paul Fletcher Robinson Design and implementation of extensible middleware for non-repudiable interactions. Search on Bibsonomy 2006   RDF
26Jordi Castellà-Roca, Josep Domingo-Ferrer A Non-Repudiable Bitstring Commitment Scheme Based on a Public-Key Cryptosystem. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Bit commitment, Mental poker
26Chwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang Hwang Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers. Search on Bibsonomy Informatica The full citation details ... 2003 DBLP  BibTeX  RDF
26Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti How to unwittingly sign non-repudiable documents with Java applications. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan, C. V. Jawahar Efficient Biometric Verification in Encrypted Domain. Search on Bibsonomy ICB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Antonio Grillo, Alessandro Lentini, Gianluigi Me, Giuseppe F. Italiano Transaction Oriented Text Messaging with Trusted-SMS. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Min-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. Search on Bibsonomy ICCSA (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Christine Laurendeau, Michel Barbeau Secure Anonymous Broadcasting in Vehicular Networks. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk Deniable authentication and key exchange. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, key exchange, deniability
20KyungKeun Lee, JoongHyo Oh, Sang-Jae Moon How to Generate Universally Verifiable Signatures in Ad-Hoc Networks. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Ad-hoc networks, Digital signature, Bilinear map, Diffie-Hellman problem
20Mikko Honkala, Petri Vuorimaa Secure Web Forms with Client-Side Signatures. Search on Bibsonomy ICWE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Patrick R. Eaton, Hakim Weatherspoon, John Kubiatowicz Efficiently Binding Data to Owners in Distributed Content-Addressable Storage Systems. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20István Zsolt Berta, Levente Buttyán, István Vajda Mitigating the Untrusted Terminal Problem Using Conditional Signatures. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF untrusted terminal, conditional signature, smart card, message authentication, electronic signature
20Els Van Herreweghen Non-repudiation in SET: Open Issues. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #60 of 60 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license