Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Santiago, Judson"'
Non-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary. Formal methods are clever and without error, therefore using them for verifying such protocols is crucial. In this p
Externí odkaz:
http://arxiv.org/abs/0710.3305
Publikováno v:
Information Security Theory and Practices-Smart Cards, Mobile and Ubiquitous Computing Systems
Information Security Theory and Practices-Smart Cards, Mobile and Ubiquitous Computing Systems, May 2007, Heraklion, Greece. pp.90-101, ⟨10.1007/978-3-540-72354-7_8⟩
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems ISBN: 9783540723530
Information Security Theory and Practices-Smart Cards, Mobile and Ubiquitous Computing Systems, May 2007, Heraklion, Greece. pp.90-101, ⟨10.1007/978-3-540-72354-7_8⟩
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems ISBN: 9783540723530
The original publication is available at www.springerlink.com ; ISBN 978-3-540-72353-0 (Pring) 0302-9743 (Online) 1611-3349; International audience; Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::157e53d3690209cb0fe071fee6ad35b3
https://hal.inria.fr/inria-00176333/document
https://hal.inria.fr/inria-00176333/document
Publikováno v:
3rd Taiwanese-French Conference on Information Technology-TFIT 06
3rd Taiwanese-French Conference on Information Technology-TFIT 06, Mar 2006, Nancy/France, pp.541-554
3rd Taiwanese-French Conference on Information Technology-TFIT 06, Mar 2006, Nancy/France, pp.541-554
Non-repudiation protocols must ensure that when two parties exchange informations over a network, neither one nor the other can deny having participated in this communication. While security issues such as secrecy and authentication have been studied
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::720973fd2c8b0a633c8ab2f841ed343c
https://inria.hal.science/inria-00105534
https://inria.hal.science/inria-00105534
Publikováno v:
1er Colloque sur les Risques et la Sécurité d'Internet et des Systèmes-CRiSIS 2005
1er Colloque sur les Risques et la Sécurité d'Internet et des Systèmes-CRiSIS 2005, Oct 2005, Bourges/France, pp.157--171
1er Colloque sur les Risques et la Sécurité d'Internet et des Systèmes-CRiSIS 2005, Oct 2005, Bourges/France, pp.157--171
While security issues such as secrecy and authentication have been studied intensively, most interest in non-repudiation protocols has only come in recent years. Non-repudiation services must ensure that when two parties exchange informations over a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::227c1658eff34ea3114b694bd46d04c5
https://hal.inria.fr/inria-00000607/file/SantiagoV-CRiSIS05.pdf
https://hal.inria.fr/inria-00000607/file/SantiagoV-CRiSIS05.pdf
Autor:
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Sauveron, Damien, Markantonakis, Konstantinos, Bilas, Angelos, Quisquater, Jean-Jacques, Santiago, Judson
Publikováno v:
Information Security Theory & Practices. Smart Cards, Mobile & Ubiquitous Computing Systems; 2007, p90-101, 12p