๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Secure Multi-Party Non-Repudiation Protocols and Applications

โœ Scribed by Josรฉ A. Onieva, Javier Lopez, Jianying Zhou (auth.)


Publisher
Springer US
Year
2009
Tongue
English
Leaves
192
Series
Advances in Information Security 43
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement.

This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications.This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications.

Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography.This book is also suitable as an advanced-level text or reference book for students in computer science.

โœฆ Table of Contents


Front Matter....Pages 1-13
Front Matter....Pages 1-1
Introduction....Pages 1-14
Fundamentals of Non-repudiation....Pages 1-15
Front Matter....Pages 1-1
Multi-Party Non-repudiation: Analysis....Pages 1-24
New Design Approaches for MPNR....Pages 1-47
Front Matter....Pages 1-1
Multi-Party Non-repudiation Applications....Pages 1-21
Scenarios Supported by MPNR Services....Pages 1-37
Front Matter....Pages 1-1
Conclusions....Pages 1-6
Back Matter....Pages 1-11

โœฆ Subjects


Systems and Data Security; Computer Communication Networks; Data Encryption; Information Systems Applications (incl.Internet); Computer Systems Organization and Communication Networks; Data Structures, Cryptology and Information Theory


๐Ÿ“œ SIMILAR VOLUMES


Secure Multi-Party Non-Repudiation Proto
โœ Josรฉ A. Onieva, Jianying Zhou ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Springer ๐ŸŒ English

<P>The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with

Secure Multi-Party E-Commerce Protocols
โœ Cฤƒtฤƒlin V. Bรฎrjoveanu, Mirela Bรฎrjoveanu ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Springer ๐ŸŒ English

<p><span>This book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physical products. The authors tackle the fairness problem in e-commerce protocols for buying physical products in scenarios involving c

Composition of Secure Multi-Party Protoc
โœ Yehuda Lindell (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Springer-Verlag Berlin Heidelberg ๐ŸŒ English

<p><P>In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results

Composition of Secure Multi-Party Protoc
โœ Yehuda Lindell (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Springer-Verlag Berlin Heidelberg ๐ŸŒ English

<p><P>In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results

Composition of Secure Multi-Party Protoc
โœ Yehuda Lindell (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Springer-Verlag Berlin Heidelberg ๐ŸŒ English

<p><P>In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results

Composition of Secure Multi-Party Protoc
โœ Yehuda Lindell (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Springer-Verlag Berlin Heidelberg ๐ŸŒ English

<p><P>In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results