A blockchain-based nonrepudiation network computing service scheme for industrial IoT

Y Xu, J Ren, G Wang, C Zhang, J Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Emerging network computing technologies extend the functionalities of industrial IoT (IIoT)
terminals. However, this promising service-provisioning scheme encounters problems in …

Efficient and practical fair exchange protocols with off-line TTP

F Bao, RH Deng, W Mao - … on Security and Privacy (Cat. No …, 1998 - ieeexplore.ieee.org
We present protocols for fair exchange of electronic data (digital signatures, payment and
confidential data) between two parties A and B. Novel properties of the proposed protocols …

A fair protocol for data trading based on bitcoin transactions

S Delgado-Segura, C Pérez-Solà… - Future Generation …, 2020 - Elsevier
On-line commercial transactions involve an inherent mistrust between participant parties
since, sometimes, no previous relation exists between them. Such mistrust may be a …

An intensive survey of fair non-repudiation protocols

S Kremer, O Markowitch, J Zhou - Computer communications, 2002 - Elsevier
With the phenomenal growth of the Internet and open networks in general, security services,
such as non-repudiation, become crucial to many applications. Non-repudiation services …

Multiparty nonrepudiation: A survey

JA Onieva, J Zhou, J Lopez - ACM Computing Surveys (CSUR), 2009 - dl.acm.org
Nonrepudiation is a security service that plays an important role in many Internet
applications. Traditional two-party nonrepudiation has been studied intensively in the …

[PDF][PDF] Probabilistic non-repudiation without trusted third party

O Markowitch, Y Roggeman - Second Conference on Security in …, 1999 - academia.edu
We present a new theoretical generic protocol that offers non-repudiation services. We first
go through the state of the art about non-repudiation. We will see that in order to achieve …

Fair exchange

H Pagnia, H Vogt, FC Gärtner - The Computer Journal, 2003 - academic.oup.com
The growing importance of electronic commerce and the increasing number of applications
in this area has led research into studying methods of how to perform safe and secure online …

[BOG][B] Foundations of security: what every programmer needs to know

C Kern, A Kesavan, N Daswani - 2007 - Springer
Dr. Gary McGraw, a well-known software security expert, said,“First things first—make sure
you know how to code, and have been doing so for years. It is better to be a developer (and …

Some remarks on a fair exchange protocol

J Zhou, R Deng, F Bao - … : Third International Workshop on Practice and …, 2000 - Springer
Fair exchange turns out to be an increasingly important topic due to the rapid growth of
electronic commerce. An exchange is deemed to be fair if at the end of exchange, either …

[PDF][PDF] Dandelion: Cooperative Content Distribution with Robust Incentives.

M Sirivianos, JH Park, X Yang, S Jarecki - USENIX Annual Technical …, 2007 - usenix.org
Content distribution via the Internet is becoming increasingly popular. To be cost-effective,
commercial content providers are considering the use of peer-to-peer (P2P) protocols such …