Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
115 | Michael Wichert, David B. Ingham, Steve J. Caughey |
Non-repudiation Evidence Generation for CORBA using XML. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
Security, XML, e-commerce, CORBA, non-repudiation |
93 | Jianying Zhou 0001, Robert H. Deng, Feng Bao 0001 |
Evolution of Fair Non-repudiation with TTP. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
fair non-repudiation, trusted third party, secure electronic commerce |
82 | Lu Bai, Chunhe Xia, Xiaojian Li, Haiquan Wang |
A Bulk Email Oriented Multi-party Non-repudiation Exchange Protocol. |
WISM |
2009 |
DBLP DOI BibTeX RDF |
SVO logic, bulk email, protocol, fairness, Encryption, non-repudiation |
82 | Eun-Jun Yoon, Kee-Young Yoo |
Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. |
ICIC (3) |
2007 |
DBLP DOI BibTeX RDF |
Public key substitution attack, Cryptanalysis, Non-repudiation, Key authentication |
82 | Sigrid Gürgens, Carsten Rudolph, Holger Vogt |
On the security of fair non-repudiation protocols. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Fair non-repudiation, Security protocols, Protocol analysis, Protocol design |
82 | Jianying Zhou 0001, Dieter Gollmann |
An Efficient Non-repudiation Protocol . |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
network security, security protocols, non-repudiation |
82 | Jianying Zhou 0001, Dieter Gollmann |
Observations on Non-repudiation. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
non-repudiation, communications security, ISO standards |
75 | C.-C. Liew, Wee Keong Ng, Ee-Peng Lim, B.-S. Tan, Kok-Leong Ong |
Non-Repudiation in an Agent-Based Electronic Commerce System. |
DEXA Workshops |
1999 |
DBLP DOI BibTeX RDF |
|
71 | Francis Klay, Laurent Vigneron |
Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder. |
Formal Aspects in Security and Trust |
2008 |
DBLP DOI BibTeX RDF |
AVISPA Tool, authentication, fairness, Cryptographic protocols, non-repudiation, automatic analysis |
71 | Jose Antonio Onieva, Javier López 0001, Rodrigo Roman, Jianying Zhou 0001, Stefanos Gritzalis |
Integration of non-repudiation services in mobile DRM scenarios. |
Telecommun. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Mobile applications, Digital rights management, Non-repudiation, Secure electronic commerce |
71 | John Malone-Lee |
Signcryption with Non-interactive Non-repudiation. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
provable security, non-repudiation, Signcryption |
71 | Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee |
A key authentication scheme with non-repudiation. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
non-repudiation security, authentication, certificate, discrete logarithm, public key |
71 | Sungwoo Tak, Eun Kyo Park |
A Software Framework for Non-Repudiation Service based on Adaptive Secure Methodology in Electronic Commerce. |
Inf. Syst. Frontiers |
2004 |
DBLP DOI BibTeX RDF |
security software framework, electronic commerce (e-commerce), adaptive secure methodology, non-repudiation |
64 | Sigrid Gürgens, Carsten Rudolph, Holger Vogt |
On the Security of Fair Non-repudiation Protocols. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
64 | Olivier Markowitch, Steve Kremer |
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
64 | Olivier Markowitch, Steve Kremer |
A Multi-party Optimistic Non-repudiation Protocol. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
62 | Omaima Bamasak, Ning Zhang 0001 |
A secure method for signature delegation to mobile agents. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
signature delegation, non-repudiation, mobile agent security |
60 | Chung-Ming Ou, Chung-Ren Ou |
Adaptation of proxy certificates to non-repudiation protocol of agent-based mobile payment systems. |
Appl. Intell. |
2009 |
DBLP DOI BibTeX RDF |
Mobile agent, PKI, Non-repudiation, Mobile payment, Proxy certificate |
60 | Michael Conrad |
Non-repudiation mechanisms for peer-to-peer networks: enabling technology for peer-to-peer economic markets. |
CoNEXT |
2006 |
DBLP DOI BibTeX RDF |
proof of reception, peer-to-peer networks, non-repudiation |
60 | Sigrid Gürgens, Carsten Rudolph |
Security analysis of efficient (Un-)fair non-repudiation protocols. |
Formal Aspects Comput. |
2005 |
DBLP DOI BibTeX RDF |
Asynchronous product automata, Fairness, Non-repudiation, Protocol analysis |
60 | Steve Kremer, Olivier Markowitch |
Fair multi-party non-repudiation protocols. |
Int. J. Inf. Sec. |
2003 |
DBLP DOI BibTeX RDF |
Group communications, Non-repudiation, Fair exchange |
60 | Tom Coffey, Puneet Saidha, Peter Burrows |
Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt. |
ISICT |
2003 |
DBLP DOI BibTeX RDF |
cryptographic protocol verification, logical postulates, proof of origin, proof of receipt, logics, security protocols, public-key cryptography, non-repudiation, deductive reasoning |
53 | Guoqiang Li 0001, Mizuhito Ogawa |
On-the-Fly Model Checking of Fair Non-repudiation Protocols. |
ATVA |
2007 |
DBLP DOI BibTeX RDF |
|
51 | Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng |
Minimizing TTP's involvement in signature validation. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Validity of evidence, Digital signature, Non-repudiation |
51 | Hossein Ghodosi, Josef Pieprzyk |
Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
Cryptography, Digital Signatures, Proxy Signatures, ElGamal signatures |
50 | Simon E. Parkin, David B. Ingham, Graham Morgan |
A Message Oriented Middleware Solution Enabling Non-repudiation Evidence Generation for Reliable Web Services. |
ISAS |
2007 |
DBLP DOI BibTeX RDF |
Web Services, Middleware, Non-repudiation, MOM |
50 | Kwangjo Kim, Sangjoon Park, Joonsang Baek |
Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
Fairness, Cryptographic Protocol, Non-repudiation, Trusted Third Party |
50 | Jerrold F. Stach, Eun Kyo Park |
Analysis of a Non Repudiation Authentication Protocol for Personal Communication Systems. |
ICCCN |
1998 |
DBLP DOI BibTeX RDF |
Personal Communications System (PCS), Non-repudiation of services, traffic analysis, one way function |
44 | Ke Zeng |
Pseudonymous PKI for Ubiquitous Computing. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Mayla Brusò, Agostino Cortesi |
Non-repudiation Analysis with LySa. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Nicolai Kuntze, Andreas U. Schmidt, Christian Hett |
Non-Repudiation in Internet Telephony. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Judson Santiago, Laurent Vigneron |
Optimistic Non-repudiation Protocol Analysis. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Chung-Ming Ou, Chung-Ren Ou |
Non-repudiation Mechanism of Agent-Based Mobile Payment Systems: Perspectives on Wireless PKI. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Kun Wei, James Heather |
A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols. |
Formal Aspects in Security and Trust |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Almudena Alcaide, Juan M. Estévez-Tapiador, Antonio Izquierdo, José María Sierra |
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol. |
ICCSA (4) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Kun Wei, James Heather |
Towards Verification of Timed Non-repudiation Protocols. |
Formal Aspects in Security and Trust |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Ronggong Song, Larry Korba |
How to Make E-cash with Non-Repudiation and Anonymity. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Jose Antonio Onieva, Jianying Zhou 0001, Mildrey Carbonell, Javier López 0001 |
Intermediary Non-repudiation Protocols. |
CEC |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Seokwon Yang, Stanley Y. W. Su, Herman Lam |
A Non-Repudiation Message Transfer Protocol for E-commerce. |
CEC |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Giampaolo Bella, Lawrence C. Paulson |
Mechanical Proofs about a Non-repudiation Protocol. |
TPHOLs |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Giampaolo Bella, Lawrence C. Paulson |
A Proof of Non-repudiation. |
Security Protocols Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Steve Kremer, Jean-François Raskin |
A Game-Based Verification of Non-repudiation and Fair Exchange Protocols. |
CONCUR |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Birgit Pfitzmann, Ahmad-Reza Sadeghi |
Anonymous Fingerprinting with Direct Non-repudiation. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
digital coin, anonymity, fingerprinting, restrictiveness |
42 | Jianying Zhou 0001, Dieter Gollmann |
A Fair Non-repudiation Protocol. |
S&P |
1996 |
DBLP DOI BibTeX RDF |
fair nonrepudiation protocol, message sender, message receiver, cryptography, protocols, formal verification, formal verification, encryption, trusted third party |
40 | Tawfiq S. M. Barhoom, Shen-sheng Zhang |
Trusted Exam Marks System at IUG Using XML-Signature. |
CIT |
2004 |
DBLP DOI BibTeX RDF |
XML Digital Signature, Multi-Signed Document, non-repudiation, XML security |
40 | Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim 0001 |
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability |
40 | N. Asokan, Gene Tsudik, Michael Waidner |
Server-Supported Signatures. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
distributed systems, mobility, network security, electronic commerce, digital signatures, non-repudiation |
40 | Ning Zhang, Qi Shi 0001 |
Security Issues in an EDI Environment. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
EDI environment, electronic transmission, trade related documents, EDI system, EDI specific security requirement, non repudiation of receipt, heterogeneous system platform, protocol, electronic data interchange, Electronic Data Interchange, security threats, security issues |
39 | Fahad Ahmed, Asif Masood, Firdous Kausar |
An Efficient Multi Recipient Signcryption Scheme Offering Non Repudiation. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Non-repudiation, Signcryption, Discrete Logarithm Problem, Public verifiability, Diffie-Hellman Problem |
39 | Rüdiger Grimm |
A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-repudiation Proofs. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
IT-security model, secure state, trust model, non-repudiation, fair exchange, obligation, transition rule |
39 | Ming-Way Huang, Hsing-Bai Chen, Wei-Bin Lee |
An Efficient Non-repudiation Mechanism for SIP-Based Services. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
digital signature, session initiation protocol, accounting, non-repudiation, hash chaining |
39 | Bob Briscoe, Ian Fairman |
Nark: receiver-based multicast non-repudiation and key management. |
EC |
1999 |
DBLP DOI BibTeX RDF |
Internet, multicast, watermark, key management, smartcard, non-repudiation, audit trail |
33 | Varad Kirtane, C. Pandu Rangan |
RSA-TBOS signcryption with proxy re-encryption. |
Digital Rights Management Workshop |
2008 |
DBLP DOI BibTeX RDF |
signcryption, proxy re-encryption |
31 | Yanping Li, Liaojun Pang |
Multi-party Non-repudiation Protocol with Different Message Exchanged. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Indranil Saha, Debapriyay Mukhopadhyay |
Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Sachin Gupta, Anoop M. Namboodiri |
Repudiation Detection in Handwritten Documents. |
ICB |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Mildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier López 0001, Jianying Zhou 0001 |
Estimation of TTP Features in Non-repudiation Service. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Ki-Woong Park, Hyunchul Seok, Kyu Ho Park |
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices. |
AINA Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Yoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah |
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks. |
ISCC |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Susan Pancho-Festin, Dieter Gollmann |
On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol. |
Formal Aspects in Security and Trust |
2005 |
DBLP DOI BibTeX RDF |
|
31 | M. Bilal, Johnson P. Thomas, Mathews Thomas, Subil Abraham |
Fair BPEL Processes Transaction using Non-Repudiation Protocols. |
IEEE SCC |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Mildrey Carbonell, Jose Antonio Onieva, Javier López 0001, Deborah Galpert, Jianying Zhou 0001 |
Timeout Estimation Using a Simulation Model for Non-repudiation Protocols. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Alessandro Aldini, Roberto Gorrieri |
Security Analysis of a Probabilistic Non-repudiation Protocol. |
PAPM-PROBMIV |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Sigrid Gürgens, Carsten Rudolph |
Security Analysis of (Un-) Fair Non-repudiation Protocols. |
FASec |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Li Bai, Ramasubramaniam Achuthanandam, Moshe Kam |
Access Revocation and Prevention of False Repudiation in Secure Email Exchanges. |
ISADS |
2001 |
DBLP DOI BibTeX RDF |
|
31 | Els Van Herreweghen |
Non-repudiation in SET: Open Issues. |
Financial Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
29 | Wei Fan, Huaying Shu, Qiang Yan 0002, Fang Wang |
A Fair Mobile Payment Protocol. |
APNOMS |
2008 |
DBLP DOI BibTeX RDF |
Mobile payment protocol, Fairness, Non-repudiation, Concurrent signatures |
29 | Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina |
Parametric probabilistic transition systems for system design and analysis. |
Formal Aspects Comput. |
2007 |
DBLP DOI BibTeX RDF |
Probabilistic non-repudiation protocol, Reachability, Parameters, Discrete-time Markov chains |
29 | Marc Girault, David Lefranc |
Server-Aided Verification: Theory and Practice. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
identification protocol, digital signature, zero-knowledge, discrete logarithm, pairing, non-repudiation, bilinear map, interactive proof |
29 | Guilin Wang, Feng Bao 0001, Kenji Imamoto, Kouichi Sakurai |
Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
security protocol, non-repudiation, fair exchange, certified email |
29 | Guilin Wang, Feng Bao 0001, Jianying Zhou 0001 |
On the Security of a Certified E-Mail Scheme. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
non-repudiation, fair exchange, certified e-mail |
29 | Jianying Zhou 0001 |
On the Security of a Multi-party Certified Email Protocol. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
security protocol, non-repudiation, certified email |
29 | Ari Juels, Jorge Guajardo |
RSA Key Generation with Verifiable Randomness. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
verifiable randomness, public-key infrastructure, zero knowledge, non-repudiation, certificate authority, key generation |
29 | Kenji Imamoto, Kouichi Sakurai |
A Certified E-mail System with Receiver's Selective Usage of Delivery Authority. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
receiver's selective protocols, electronic commerce, non-repudiation, certified e-mail |
22 | Tian-Fu Lee, Tzonelih Hwang, Shu-Hui Chang, Song-Kong Chong |
Enhanced delegation-based authentication protocol for PCSs. |
IEEE Trans. Wirel. Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Lifeng Sang, Anish Arora |
A Wireless Security Framework without Shared Secrets. |
SSS |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Shouhuai Xu, Xiaohu Li, T. Paul Parker |
Exploiting social networks for threshold signing: attack-resilience vs. availability. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
attack-resilience, threshold signing, social networks, availability, threshold cryptography |
22 | Yang Xu 0021, Xiaoyao Xie |
Security analysis of routing protocol for MANET based on extended Rubin logic. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Chung-Ming Ou, Chung-Ren Ou |
SETNR/A: An Agent-Based Secure Payment Protocol for Mobile Commerce. |
KES-AMSTA |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, Seungjae Yoo |
Secret Signatures: How to Achieve Business Privacy Efficiently? |
WISA |
2007 |
DBLP DOI BibTeX RDF |
Secret signature, signature privacy, public provability, public auction, anonymity, key agreement |
22 | Mohammed Assora, James Kadirire, Ayoub Shirvani |
Using WPKI for Security of Web Transaction. |
EC-Web |
2007 |
DBLP DOI BibTeX RDF |
Web transaction security, wireless security services, digital signature, SSL/TLS |
22 | Istemi Ekin Akkus, Öznur Özkasap, M. Reha Civanlar |
Secure Transmission of Video on an End System Multicast Using Public Key Cryptography. |
MRCS |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Aleksandra Nenadic, Ning Zhang 0001, Qi Shi 0001, Carole A. Goble |
DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery. |
EEE |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Aleksandra Nenadic, Ning Zhang 0001, Stephen K. Barton |
Fair certified e-mail delivery. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Li-Sha He, Ning Zhang 0001 |
A new signature scheme: joint-signature. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
M-Payment, digital signature, security protocol, M-Commerce |
22 | Aleksandra Nenadic, Ning Zhang 0001, Stephen K. Barton |
A Security Protocol for Certified E-Goods Delivery. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai |
The Role of Arbiters in Asymmetric Authentication Schemes. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Jianying Zhou 0001 |
Maintaining the Validity of Digital Signatures in B2B Applications. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Moni Naor |
Deniable Ring Authentication. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng |
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Peer Hasselmeyer, Markus Schumacher, Marco Voß |
Pay As You Go-Associating Costs with Jini Leases. |
EDOC |
2000 |
DBLP DOI BibTeX RDF |
Jini leases, time-constrained access, commercial environment authentication, Jini-enabled services, cryptography, encryption, leasing, distributed garbage collection, fault-tolerant distributed applications |
20 | Mohamed Rasslan, Mahmoud M. Nasreldin, Doaa Abdelrahman, Aya Elshobaky, Heba Aslan |
Networking and cryptography library with a non-repudiation flavor for blockchain. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Ke Yang 0007, Meihua Xiao, Xiaomei Zhong, Yingqiang Zhong |
A novel formal logic for formal analysis of timeliness in non-repudiation protocols. |
J. King Saud Univ. Comput. Inf. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Valentin Zieglmeier |
Appending Data to Blockchain is not Sufficient for Non-repudiation of Receipt. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Nayana Hegde, Sunilkumar S. Manvi |
Distributed integrity and non-repudiation scheme in the dynamic vehicular cloud environment. |
Int. J. Inf. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Rui Zhang, Lei Zhang 0009, Kim-Kwang Raymond Choo, Tong Chen |
Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications. |
IEEE Trans. Dependable Secur. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Togdé Ngarenon, Augustin P. Sarr |
An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation. |
SPACE |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Yaorui He, Ting Liang, Pei Huang 0024, Zhe Xia |
Verifiable Attribute-Based Proxy Re-encryption with Non-repudiation Based on Blockchain. |
BlockTEA |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Xu Guo |
Fairness analysis of extra-gain guilty of a non-repudiation protocol. |
Frontiers Inf. Technol. Electron. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Fei Chen 0003, Jiahao Wang, Jianqiang Li, Yang Xu 0013, Cheng Zhang, Tao Xiang 0001 |
TrustBuilder: A non-repudiation scheme for IoT cloud applications. |
Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|