A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-repudiation Proofs.
Rüdiger GrimmPublished in: SECURWARE (2009)
Keyphrases
- security model
- signature scheme
- public key
- fair exchange
- digital signature
- security analysis
- trusted third party
- fair exchange protocols
- secret key
- electronic commerce
- access control
- authentication protocol
- public key cryptography
- security requirements
- multi agent
- key distribution
- encryption scheme
- multi party
- credit card
- information systems
- multi agent systems