Analysing the security of a non-repudiation communication protocol with mandatory proof of receipt.
Tom CoffeyPuneet SaidhaPeter BurrowsPublished in: ISICT (2003)
Keyphrases
- communication protocol
- communication protocols
- physical layer
- security mechanisms
- mobile payment
- information security
- wifi
- public key infrastructure
- access control
- neural network
- digital signature
- security policies
- trusted third party
- security requirements
- signature scheme
- security issues
- mobile devices
- key management
- security services