On the Security of Fair Non-repudiation Protocols.
Sigrid GürgensCarsten RudolphHolger VogtPublished in: ISC (2003)
Keyphrases
- secure electronic
- security requirements
- trusted third party
- security services
- security protocols
- multi party non repudiation
- security mechanisms
- key agreement protocol
- authentication protocol
- communication protocols
- cryptographic protocols
- information security
- security properties
- mobile payment
- high security
- security analysis
- key exchange
- access control
- intrusion detection
- security model
- public key infrastructure
- application level
- secure multiparty computation
- key distribution
- signature scheme
- security issues
- personal information
- network security
- security policies
- key management
- statistical databases
- digital signature
- ns simulator
- diffie hellman
- privacy preserving
- wireless networks
- mutual authentication
- credit card
- key establishment
- messages exchanged
- security level
- distributed systems