An intensive survey of fair non-repudiation protocols

S Kremer, O Markowitch, J Zhou - Computer communications, 2002 - Elsevier
With the phenomenal growth of the Internet and open networks in general, security services,
such as non-repudiation, become crucial to many applications. Non-repudiation services …

Fair exchange

H Pagnia, H Vogt, FC Gärtner - The Computer Journal, 2003 - academic.oup.com
The growing importance of electronic commerce and the increasing number of applications
in this area has led research into studying methods of how to perform safe and secure online …

[PDF][PDF] Cryptography in radio frequency identification and fair exchange protocols

G Avoine - 2005 - sites.uclouvain.be
Fair exchange stems from a daily life problem: how can two people exchange objects
(material or immaterial) fairly, that is, without anyone being hurt in the exchange? More …

[BOK][B] Formal correctness of security protocols

G Bella - 2007 - books.google.com
Computer network security is critical to fraud prevention and accountability. Network
participants are required to observe predefined steps called security protocols, whose proof …

An optimistic non-repudiation protocol with transparent trusted third party

O Markowitch, S Kremer - International Conference on Information Security, 2001 - Springer
In this paper we consider a new and efficient optimistic nonrepudiation protocol. In a non-
repudiation protocol, during which Alice wants to transmit a message to Bob, Alice has to …

[PDF][PDF] Optimistic non-repudiable information exchange

S Kremer, O Markowitch - Symposium on Information Theory in the …, 2000 - academia.edu
In this paper we consider the optimistic approach of the non-repudiation protocols. We study
the most complete non-repudiation protocol with off-line trusted third party and we put …

A multi-party optimistic non-repudiation protocol

O Markowitch, S Kremer - International Conference on Information Security …, 2000 - Springer
In this paper we consider the optimistic approach of the non-repudiation protocols. We study
a non-repudiation protocol with off-line trusted third party and we keep on with the definition …

Generic non-repudiation protocols supporting transparent off-line TTP

G Wang - Journal of Computer Security, 2006 - content.iospress.com
A non-repudiation protocol enables the fair exchange of an electronic message and an
irrefutable digital receipt between two mistrusting parties over the Internet. That is, at the end …

Compositional analysis of contract-signing protocols

M Backes, A Datta, A Derek, JC Mitchell… - Theoretical Computer …, 2006 - Elsevier
We develop a general method for proving properties of contract-signing protocols using a
specialized protocol logic. The method is applied to the Asokan–Shoup–Waidner and the …

Inductive verification of cryptographic protocols

G Bella - 2000 - cl.cam.ac.uk
The dissertation aims at tailoring Paulson's Inductive Approach for the analysis of classical
cryptographic protocols towards real-world protocols. The aim is pursued by extending the …