X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
nonrepudiation (80) 80
authentication (26) 26
confidentiality (23) 23
cryptography (23) 23
security (22) 22
integrity (18) 18
digital signatures (17) 17
digital signature (12) 12
privacy (11) 11
data security (10) 10
engineering, electrical & electronic (10) 10
accountability (9) 9
availability (9) 9
computer science, information systems (8) 8
information security (8) 8
protocols (8) 8
cloud computing (7) 7
computer science (7) 7
data encryption (7) 7
encryption (7) 7
service-level agreement (7) 7
access control (6) 6
cloud security (6) 6
computer science, hardware & architecture (6) 6
computer science, software engineering (6) 6
computer science, theory & methods (6) 6
cryptographic protocols (6) 6
proof of violation (6) 6
protection (6) 6
proxy signature (6) 6
telecommunications (6) 6
cloud storage (5) 5
decryption (5) 5
electronic mail (5) 5
logging (5) 5
public key (5) 5
scheme (5) 5
signatures (5) 5
threshold proxy signature (5) 5
anonymity (4) 4
auditing (4) 4
authenticity (4) 4
computer networks (4) 4
data integrity (4) 4
electronic commerce (4) 4
law (4) 4
monitoring (4) 4
network security (4) 4
performance evaluation (4) 4
protocol (4) 4
recording (4) 4
unforgeability (4) 4
computer information security (3) 3
computers (3) 3
devices (3) 3
game theory (3) 3
instant-messaging security (3) 3
internet (3) 3
legal factors (3) 3
mathematics, applied (3) 3
medical services (3) 3
networking (3) 3
networks (3) 3
non-repudiation (3) 3
pki (3) 3
postal services (3) 3
public key cryptography (3) 3
public key infrastructure (3) 3
secure (3) 3
simultaneity (3) 3
standards (3) 3
strong nonrepudiation (3) 3
studies (3) 3
transactions (3) 3
transportation science & technology (3) 3
web and internet services (3) 3
ad hoc networks (2) 2
admissibility (2) 2
assessments (2) 2
authorization (2) 2
bilinear pairings (2) 2
biometrics (2) 2
blockchain (2) 2
business (2) 2
certification (2) 2
certified email (2) 2
chosen ciphertext attack (2) 2
cloud (2) 2
communication system security (2) 2
computer communication networks (2) 2
computer programs (2) 2
computer science, general (2) 2
computer science, interdisciplinary applications (2) 2
computer security (2) 2
contracts (2) 2
counting circuits (2) 2
deniability (2) 2
designated verifiable (2) 2
deterrence (2) 2
digital (2) 2
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


International Journal of Network Security, ISSN 1816-353X, 2016, Volume 18, Issue 2, pp. 201 - 208
Journal Article
IEICE Transactions on Information and Systems, ISSN 0916-8532, 2011, Volume E94-D, Issue 11, pp. 2171 - 2172
Journal Article
Mathematical and Computer Modelling, ISSN 0895-7177, 07/2013, Volume 58, Issue 1-2, pp. 186 - 195
Many certificateless schemes have been proposed for different purposes, but as for as their applications in any electronic cash schemes there is still a lot of... 
Anonymity | Group signcryption | Authentication | Electronic cash system | Nonrepudiation | Unlinkability | MATHEMATICS, APPLIED
Journal Article
Applied Mathematics and Computation, ISSN 0096-3003, 2003, Volume 136, Issue 2, pp. 315 - 321
Recently, Sun et al. pointed out some weaknesses of Zhang’s threshold proxy signature scheme and a disadvantage of Kim’s threshold proxy signature scheme. They... 
Verifiable secret sharing | Threshold proxy signature | Nonrepudiation
Journal Article
Journal of Supercomputing, ISSN 0920-8542, 01/2019, Volume 75, Issue 1, pp. 65 - 76
In this paper we propose to employ the concept of proof of violation (POV) for the response time auditing in the cloud. A POV scheme enables a user or a... 
Response time | Service-level agreement | Accountability | Cloud | Nonrepudiation | Proof of violation | Auditing | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | COMPUTER SCIENCE, THEORY & METHODS | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 01/2009, Volume 41, Issue 1, pp. 1 - 43
Nonrepudiation is a security service that plays an important role in many Internet applications. Traditional two-party nonrepudiation has been studied... 
multiparty protocols | Multiparty applications | nonrepudiation | Multiparty protocols | Nonrepudiation | MAIL | FAIR EXCHANGE | NON-REPUDIATION PROTOCOLS | COMPUTER SCIENCE, THEORY & METHODS | Security
Journal Article
Journal of Information Processing Systems, ISSN 1976-913X, 2012, Volume 8, Issue 4, pp. 567 - 574
Journal Article
by Chen, CL and Deng, YY and Lee, CF and Zhu, S and Chiu, YJ and Wu, CM
SENSORS AND MATERIALS, ISSN 0914-4935, 2019, Volume 31, Issue 3, pp. 1037 - 1063
Journal Article
International Journal of Network Security, ISSN 1816-353X, 2009, Volume 8, Issue 2, pp. 199 - 200
Journal Article
Concurrency and Computation: Practice and Experience, ISSN 1532-0626, 03/2016, Volume 28, Issue 3, pp. 583 - 599
Summary In this paper, we propose solution for obtaining mutual nonrepudiation between the user and service provider in cloud storage. One of the solutions for... 
cloud storage | service‐level agreement | SLA | cloud security | nonrepudiation | hash tree | service-level agreement | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, THEORY & METHODS | Cloud computing | Exchange | Messages | Copyrights | Chains | Mathematical models | Stores | Devices
Journal Article
ACM Transactions on Information and System Security (TISSEC), ISSN 1094-9224, 05/2006, Volume 9, Issue 2, pp. 138 - 161
Classical security protocols aim to achieve authentication and confidentiality under the assumption that the peers behave honestly. Some recent protocols are... 
proof tools | inductive method | certified email | Isabelle | Nonrepudiation | Certified email | Inductive method | Proof tools
Journal Article
Software: Practice and Experience, ISSN 0038-0644, 05/2014, Volume 44, Issue 5, pp. 511 - 535
SUMMARY The development of mobile signatures could increase the spread and adoption of mobile services based on electronic signatures, such as mobile payments,... 
mobile signature | SIP | instant messaging | mobile signature service | nonrepudiation | e‐commerce | presence awareness | e-commerce | COMPUTER SCIENCE, SOFTWARE ENGINEERING | SCHEME | Networks | Weight reduction | Electronics | Spreads | Proposals | Devices | Signatures | Computer programs
Journal Article
IEICE Transactions on Communications, ISSN 0916-8516, 2012, Volume E95-B, Issue 7, pp. 2245 - 2256
Multimedia transactions between vehicles are expected to become a promising application in VANETs but security is a fundamental issue that must be resolved... 
Digital signature | VANET security | Multimedia transaction | Security protocol | Nonrepudiation | security protocol | digital signature | AUTHENTICATION | SIGNATURE SCHEME | multimedia transaction | TELECOMMUNICATIONS | nonrepudiation | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), ISSN 1551-6857, 06/2013, Volume 9, Issue 3, pp. 1 - 20
Current mobile pay-TV systems have two types of Conditional Access Systems (CAS): group-key-based and public-key systems. The best feature of group-key-based... 
multimedia delivery | sophisticated access control | nonrepudiation | Digital video broadcasting | Sophisticated access control | Multimedia delivery | Nonrepudiation | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INFORMATION SYSTEMS | COMPUTER SCIENCE, THEORY & METHODS | Security | Access control
Journal Article
Information Security Journal: A Global Perspective, ISSN 1939-3555, 11/2009, Volume 18, Issue 5, pp. 257 - 266
The scope of this article is to evaluate the provision of nonrepudiation in electronic transactions. For the evaluation of the provision of nonrepudiation, two... 
biometrics | digital signatures | Nonrepudiation | Biometrics | Computer information security | Digital signatures
Journal Article
Proceedings of the 2013 International Conference on software engineering, ISSN 0270-5257, 05/2013, pp. 1419 - 1422
Forensic analysis of software log files is used to extract user behavior profiles, detect fraud, and check compliance with policies and regulations. Software... 
Measurement | Forensics | metric | Medical services | grounded theory | software logs | Software systems | logging | Security | nonrepudiation | Standards | forensics | security
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.