Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An intensive survey of fair non-repudiation protocols
With the phenomenal growth of the Internet and open networks in general, security services,
such as non-repudiation, become crucial to many applications. Non-repudiation services …
such as non-repudiation, become crucial to many applications. Non-repudiation services …
Fair exchange
H Pagnia, H Vogt, FC Gärtner - The Computer Journal, 2003 - academic.oup.com
The growing importance of electronic commerce and the increasing number of applications
in this area has led research into studying methods of how to perform safe and secure online …
in this area has led research into studying methods of how to perform safe and secure online …
[PDF][PDF] Cryptography in radio frequency identification and fair exchange protocols
G Avoine - 2005 - sites.uclouvain.be
Fair exchange stems from a daily life problem: how can two people exchange objects
(material or immaterial) fairly, that is, without anyone being hurt in the exchange? More …
(material or immaterial) fairly, that is, without anyone being hurt in the exchange? More …
[BOK][B] Formal correctness of security protocols
G Bella - 2007 - books.google.com
Computer network security is critical to fraud prevention and accountability. Network
participants are required to observe predefined steps called security protocols, whose proof …
participants are required to observe predefined steps called security protocols, whose proof …
An optimistic non-repudiation protocol with transparent trusted third party
In this paper we consider a new and efficient optimistic nonrepudiation protocol. In a non-
repudiation protocol, during which Alice wants to transmit a message to Bob, Alice has to …
repudiation protocol, during which Alice wants to transmit a message to Bob, Alice has to …
[PDF][PDF] Optimistic non-repudiable information exchange
In this paper we consider the optimistic approach of the non-repudiation protocols. We study
the most complete non-repudiation protocol with off-line trusted third party and we put …
the most complete non-repudiation protocol with off-line trusted third party and we put …
A multi-party optimistic non-repudiation protocol
In this paper we consider the optimistic approach of the non-repudiation protocols. We study
a non-repudiation protocol with off-line trusted third party and we keep on with the definition …
a non-repudiation protocol with off-line trusted third party and we keep on with the definition …
Generic non-repudiation protocols supporting transparent off-line TTP
G Wang - Journal of Computer Security, 2006 - content.iospress.com
A non-repudiation protocol enables the fair exchange of an electronic message and an
irrefutable digital receipt between two mistrusting parties over the Internet. That is, at the end …
irrefutable digital receipt between two mistrusting parties over the Internet. That is, at the end …
Compositional analysis of contract-signing protocols
We develop a general method for proving properties of contract-signing protocols using a
specialized protocol logic. The method is applied to the Asokan–Shoup–Waidner and the …
specialized protocol logic. The method is applied to the Asokan–Shoup–Waidner and the …
Inductive verification of cryptographic protocols
G Bella - 2000 - cl.cam.ac.uk
The dissertation aims at tailoring Paulson's Inductive Approach for the analysis of classical
cryptographic protocols towards real-world protocols. The aim is pursued by extending the …
cryptographic protocols towards real-world protocols. The aim is pursued by extending the …