From post

An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party.

, и . ISC, том 2200 из Lecture Notes in Computer Science, стр. 363-378. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fair multi-party non-repudiation protocols., и . Int. J. Inf. Sec., 1 (4): 223-235 (2003)Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols., , , и . POST, том 10204 из Lecture Notes in Computer Science, стр. 117-140. Springer, (2017)Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses., , , , , и . USENIX Security Symposium, стр. 5899-5916. USENIX Association, (2023)07421 Executive Summary -- Formal Protocol Verification Applied., , и . Formal Protocol Verification Applied, том 07421 из Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)Game Analysis of Abuse-free Contract Signing., и . CSFW, стр. 206-. IEEE Computer Society, (2002)Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks., и . SecCo, том 128 из Electronic Notes in Theoretical Computer Science, стр. 87-104. Elsevier, (2004)An Extensive Formal Analysis of Multi-factor Authentication Protocols., и . CSF, стр. 1-15. IEEE Computer Society, (2018)A Multi-Party Non-Repudiation Protocol., и . SEC, том 175 из IFIP Conference Proceedings, стр. 271-280. Kluwer, (2000)An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party., и . ISC, том 2200 из Lecture Notes in Computer Science, стр. 363-378. Springer, (2001)Introduction., и . Formal Models and Techniques for Analyzing Security Protocols, том 5 из Cryptology and Information Security Series, IOS Press, (2011)