Computationally sound mechanized proof for a non-repudiation protocol

被引:0
|
作者
Feng, Chao [1 ]
Chen, Yue-Bing [1 ]
Zhang, Quan [1 ]
Tang, Chao-Jing [1 ]
机构
[1] School of Electronic Science, National University of Defense Technology, Changsha 410073, China
来源
Tongxin Xuebao/Journal on Communications | 2011年 / 32卷 / 03期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
13
引用
收藏
页码:18 / 26
相关论文
共 50 条
  • [1] A proof of non-repudiation
    Bella, G
    Paulson, LC
    SECURITY PROTOCOLS, 2002, 2467 : 119 - 125
  • [2] An efficient non-repudiation protocol
    Zhou, JY
    Gollmann, D
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 126 - 132
  • [3] A fair non-repudiation protocol
    Meng, B
    Wang, SM
    Xiong, QX
    PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON CSCW IN DESIGN, 2002, : 68 - 73
  • [4] A Fair Non-Repudiation Protocol
    Meng, B. (mengbo@263.net.cn), FAPERJ; SBC; UFRI; IEEE; COPPETEC FUNDACAO (Institute of Electrical and Electronics Engineers Inc.):
  • [5] Non-repudiation with mandatory proof of receipt
    Coffey, Tom
    Saidha, Puneet
    Computer Communication Review, 1996, 26 (01): : 6 - 17
  • [6] A fair non-repudiation protocol
    Zhou, JY
    Gollmann, D
    1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 55 - 61
  • [7] A proof of non-repudiation - (Transcript of discussion)
    Paulson, L
    SECURITY PROTOCOLS, 2002, 2467 : 126 - 133
  • [8] Automatic Analysis of a Non-Repudiation Protocol
    Lanotte, Ruggero
    Maggiolo-Schettini, Andrea
    Troina, Angelo
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 : 113 - 129
  • [9] A mutual non-repudiation protocol with privacy
    Jiang Xiao-ning
    Ye Cheng-qing
    Journal of Zhejiang University-SCIENCE A, 2000, 1 (3): : 317 - 321
  • [10] Optimistic non-repudiation protocol analysis
    Santiago, Judson
    Vigneron, Laurent
    INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 90 - +