Skip to main content

Secure Multi-Party Non-Repudiation Protocols and Applications

  • Book
  • © 2009

Overview

  • Security professionals will find this book very useful in the design of secure applications with multiple entities, helping them to envisage the basics of multi-party non-repudiation
  • Useful as an advanced level textbook for students or researchers who wish to understand the non-repudiation service and mechanisms in the presence of an undefined number of players

Part of the book series: Advances in Information Security (ADIS, volume 43)

  • 3014 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this book

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement.

This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications.

Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. This book is also suitable as an advanced-level text or reference book for students incomputer science.

Similar content being viewed by others

Keywords

Table of contents (7 chapters)

  1. Introduction and Fundamentals

  2. Multi-Party Non-repudiation

  3. Applications

  4. Conclusions

Authors and Affiliations

  • Computer Science Dept., E.T.S. Ingenieria Informaica, University of Malaga, Malaga, Spain

    José A. Onieva, Javier Lopez

  • Institute for Infocomm Research (12R), Singapore, Singapore

    Jianying Zhou

Bibliographic Information

Publish with us