The design and analysis of an electronic evidence and non-repudiation protocol
暂无分享,去创建一个
[1] Ernest F. Brickell,et al. Gradual and Verifiable Release of a Secret , 1987, CRYPTO.
[2] Ye Cheng-qing. Electronic evidence and non-repudiation protocol , 2000 .
[3] Dieter Gollmann,et al. Evidence and non-repudiation , 1997 .
[4] Lawrence Bernstein,et al. The system is the business—But at what cost? , 2005, Journal of Network and Systems Management.
[5] Dieter Gollmann,et al. A fair non-repudiation protocol , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[6] Dan M. Nessett,et al. A critique of the Burrows, Abadi and Needham logic , 1990, OPSR.
[7] Tom Coffey,et al. Non-repudiation with mandatory proof of receipt , 1996, CCRV.
[8] Ellis Horowitz,et al. A Randomized Protocol for , 2022 .
[9] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[10] Robert H. Deng,et al. Practical protocols for certified electronic mail , 1996, Journal of Network and Systems Management.