<P>The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with
Secure Multi-Party Non-Repudiation Protocols and Applications
โ Scribed by Josรฉ A. Onieva, Javier Lopez, Jianying Zhou (auth.)
- Publisher
- Springer US
- Year
- 2009
- Tongue
- English
- Leaves
- 192
- Series
- Advances in Information Security 43
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement.
This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications.This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications.
Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography.This book is also suitable as an advanced-level text or reference book for students in computer science.
โฆ Table of Contents
Front Matter....Pages 1-13
Front Matter....Pages 1-1
Introduction....Pages 1-14
Fundamentals of Non-repudiation....Pages 1-15
Front Matter....Pages 1-1
Multi-Party Non-repudiation: Analysis....Pages 1-24
New Design Approaches for MPNR....Pages 1-47
Front Matter....Pages 1-1
Multi-Party Non-repudiation Applications....Pages 1-21
Scenarios Supported by MPNR Services....Pages 1-37
Front Matter....Pages 1-1
Conclusions....Pages 1-6
Back Matter....Pages 1-11
โฆ Subjects
Systems and Data Security; Computer Communication Networks; Data Encryption; Information Systems Applications (incl.Internet); Computer Systems Organization and Communication Networks; Data Structures, Cryptology and Information Theory
๐ SIMILAR VOLUMES
<p><span>This book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physical products. The authors tackle the fairness problem in e-commerce protocols for buying physical products in scenarios involving c
<p><P>In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results
<p><P>In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results
<p><P>In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results
<p><P>In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results