Skip to main content
  • Book
  • © 2009

Secure Multi-Party Non-Repudiation Protocols and Applications

  • Security professionals will find this book very useful in the design of secure applications with multiple entities, helping them to envisage the basics of multi-party non-repudiation
  • Useful as an advanced level textbook for students or researchers who wish to understand the non-repudiation service and mechanisms in the presence of an undefined number of players

Part of the book series: Advances in Information Security (ADIS, volume 43)

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (7 chapters)

  1. Front Matter

    Pages 1-13
  2. Introduction and Fundamentals

    1. Front Matter

      Pages 1-1
    2. Introduction

      • José A. Onieva, Javier Lopez, Jianying Zhou
      Pages 1-14
    3. Fundamentals of Non-repudiation

      • José A. Onieva, Javier Lopez, Jianying Zhou
      Pages 1-15
  3. Multi-Party Non-repudiation

    1. Front Matter

      Pages 1-1
    2. Multi-Party Non-repudiation: Analysis

      • José A. Onieva, Javier Lopez, Jianying Zhou
      Pages 1-24
    3. New Design Approaches for MPNR

      • José A. Onieva, Javier Lopez, Jianying Zhou
      Pages 1-47
  4. Applications

    1. Front Matter

      Pages 1-1
    2. Multi-Party Non-repudiation Applications

      • José A. Onieva, Javier Lopez, Jianying Zhou
      Pages 1-21
    3. Scenarios Supported by MPNR Services

      • José A. Onieva, Javier Lopez, Jianying Zhou
      Pages 1-37
  5. Conclusions

    1. Front Matter

      Pages 1-1
    2. Conclusions

      • José A. Onieva, Javier Lopez, Jianying Zhou
      Pages 1-6
  6. Back Matter

    Pages 1-11

About this book

Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement.

This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications.

Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. This book is also suitable as an advanced-level text or reference book for students incomputer science.

Authors and Affiliations

  • Computer Science Dept., E.T.S. Ingenieria Informaica, University of Malaga, Malaga, Spain

    José A. Onieva, Javier Lopez

  • Institute for Infocomm Research (12R), Singapore, Singapore

    Jianying Zhou

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access