Secure Multi-Party Non-Repudiation Protocols and Applications
Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement. This v...
Main Authors: | Onieva, José A. (Author), Lopez, Javier (Author), Zhou, Jianying (Author) |
---|---|
Corporate Author: | SpringerLink (Online service) |
Format: | Electronic eBook |
Language: | English |
Published: |
Boston, MA :
Springer US,
2009.
|
Series: | Advances in Information Security,
43 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Similar Items
-
Network Security Policies and Procedures
by: Frye, Douglas W.
Published: (2007) -
Security for Telecommunications Networks
by: Traynor, Patrick, et al.
Published: (2008) -
Insider Threats in Cyber Security
Published: (2010) -
Global Initiatives to Secure Cyberspace An Emerging Landscape /
Published: (2009) -
Vulnerability Analysis and Defense for the Internet
Published: (2008)