Skip to main content

Secure Multi-Party Non-Repudiation Protocols and Applications

  • Book
  • © 2009

Overview

  • Security professionals will find this book very useful in the design of secure applications with multiple entities, helping them to envisage the basics of multi-party non-repudiation
  • Useful as an advanced level textbook for students or researchers who wish to understand the non-repudiation service and mechanisms in the presence of an undefined number of players

Part of the book series: Advances in Information Security (ADIS, volume 43)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement.

This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications.

Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. This book is also suitable as an advanced-level text or reference book for students incomputer science.

Similar content being viewed by others

Keywords

Table of contents (7 chapters)

  1. Introduction and Fundamentals

  2. Multi-Party Non-repudiation

  3. Applications

  4. Conclusions

Authors and Affiliations

  • Computer Science Dept., E.T.S. Ingenieria Informaica, University of Malaga, Malaga, Spain

    José A. Onieva, Javier Lopez

  • Institute for Infocomm Research (12R), Singapore, Singapore

    Jianying Zhou

Bibliographic Information

Publish with us