Secure Multi-Party Non-Repudiation Protocols and Applications [electronic resource] / by JosȨ A. Onieva, Javier Lopez, Jianying Zhou.
Tipo de material: TextoSeries Advances in Information Security ; 43 | Advances in Information Security ; 43Editor: Boston, MA : Springer US, 2009Descripción: XVIII, 190p. 20 illus. online resourceTipo de contenido:- text
- computer
- online resource
- 9780387756301
- SpringerLink (Online service)
- Computer science
- Computer network architectures
- Computer Communication Networks
- Data protection
- Data structures (Computer science)
- Data encryption (Computer science)
- Information systems
- Computer Science
- Systems and Data Security
- Computer Communication Networks
- Data Encryption
- Information Systems Applications (incl.Internet)
- Computer Systems Organization and Communication Networks
- Data Structures, Cryptology and Information Theory
and Fundamentals -- Fundamentals of Non-repudiation -- Multi-Party Non-repudiation -- Multi-Party Non-repudiation: Analysis -- New Design Approaches for MPNR -- Applications -- Multi-Party Non-repudiation Applications -- Scenarios Supported by MPNR Services -- Conclusions -- Conclusions.
Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement. This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications.This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography.This book is also suitable as an advanced-level text or reference book for students in computer science.
ZDB-2-SCS
No hay comentarios en este titulo.