On the security of fair non-repudiation protocols.
Sigrid GürgensCarsten RudolphHolger VogtPublished in: Int. J. Inf. Sec. (2005)
Keyphrases
- secure electronic
- security requirements
- trusted third party
- security services
- security protocols
- security mechanisms
- multi party non repudiation
- cryptographic protocols
- key agreement protocol
- security properties
- authentication protocol
- information security
- communication protocols
- mobile payment
- security analysis
- access control
- key distribution
- high security
- mutual authentication
- public key infrastructure
- application level
- secure multiparty computation
- key exchange
- security model
- intrusion detection
- messages exchanged
- security issues
- personal information
- contractual obligations
- digital signature
- wireless sensor networks
- key establishment
- transaction processing systems
- network security
- resource constrained
- key management
- data integrity
- security level
- communication protocol