Attacks on some RSA signatures
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Non-repudiation: constituting evidence and proof in digital cooperation
Computer Standards & Interfaces - Special issue: German National Research Center for computer science (GMD)
Digital signets: self-enforcing protection of digital information (preliminary version)
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
Journal of Network and Computer Applications
Achieving non-repudiation of Web based transactions
Journal of Systems and Software
Secure linking of customers, merchants and banks in electronic commerce
Future Generation Computer Systems - Special issue on security on the Web
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Observations on Non-repudiation
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
An Efficient Non-repudiation Protocol
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Formal Analysis of a Non-Repudiation Protocol
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Securing digital signatures for non-repudiation
Computer Communications
Hi-index | 0.00 |
Our main purpose in this paper is to present an effective and secure on-line software transaction protocol. On-line software transaction should meet some requirements such as security and nonrepudiation. Our research will be mainly based on public cryptosystem, digital signature and nonrepudiation protocol to establish an on-line software transaction protocol.