Optimistic protocols for fair exchange
Proceedings of the 4th ACM conference on Computer and communications security
Undeniable billing in mobile communication
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
On the efficient implementation of fair non-repudiation
ACM SIGCOMM Computer Communication Review
Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world
ACM Transactions on Internet Technology (TOIT)
Some guidelines for non-repudiation protocols
ACM SIGCOMM Computer Communication Review
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Finite-state analysis of two contract signing protocols
Theoretical Computer Science
A Secure Payment Protocol Using Mobile Agents in an Untrusted Host Environment
ISEC '01 Proceedings of the Second International Symposium on Topics in Electronic Commerce
An Anomymous Fair Exchange E-commerce Protocol
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Evolution of Fair Non-repudiation with TTP
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
A Practical English Auction with One-Time Registration
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Models and Protocol Structures for Software Agent Based Complex E-Commerce Transactions
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
Non Interference for the Analysis of Cryptographic Protocols
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
Fair Exchange of Digital Signatures with Offline Trusted Third Party
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Mechanical Proofs about a Non-repudiation Protocol
TPHOLs '01 Proceedings of the 14th International Conference on Theorem Proving in Higher Order Logics
Efficient Fair Exchange with Verifiable Confirmation of Signatures
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Off-Line Fair Payment Protocols Using Convertible Signatures
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Revised Papers from the 9th International Workshop on Security Protocols
Optimistic Fair Exchange with Transparent Signature Recovery
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Analysis of Abuse-Free Contract Signing
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
A Uniform Approach for the Definition of Security Properties
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
Exploring Fair Exchange Protocols Using Specification Animation
ISW '00 Proceedings of the Third International Workshop on Information Security
An Efficient Protocol for Certified Electronic Mail
ISW '00 Proceedings of the Third International Workshop on Information Security
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party
ISC '01 Proceedings of the 4th International Conference on Information Security
A Realistic Protocol for Multi-party Certified Electronic Mail
ISC '02 Proceedings of the 5th International Conference on Information Security
Exclusion-Freeness in Multi-party Exchange Protocols
ISC '02 Proceedings of the 5th International Conference on Information Security
A Secure Pay-per View Scheme for Web-Based Video Service
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Supporting fair exchange in mobile environments
Mobile Networks and Applications - Security in mobile computing environments
ACM SIGecom Exchanges
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Fair certified e-mail delivery
Proceedings of the 2004 ACM symposium on Applied computing
Design and implementation of secure e-mail system using elliptic curve cryptosystem
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
Certified mail: the next challenge for secure messaging
Communications of the ACM - Interactive immersion in 3D graphics
On timeliness of a fair non-repudiation protocol
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Certified E-Mail Delivery with DSA Receipts
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
An abuse-free fair contract signing protocol based on the RSA signature
WWW '05 Proceedings of the 14th international conference on World Wide Web
Non-interference proof technique for the analysis of cryptographic protocols
Journal of Computer Security - Special issue on WITS'03
ACM Transactions on Information and System Security (TISSEC)
ACM SIGOPS Operating Systems Review
A fair and secure mobile billing system
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Family of Trusted Third Party Based Fair-Exchange Protocols
IEEE Transactions on Dependable and Secure Computing
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Accountability protocols: Formalized and verified
ACM Transactions on Information and System Security (TISSEC)
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
An anonymous and failure resilient fair-exchange e-commerce protocol
Decision Support Systems
Generic non-repudiation protocols supporting transparent off-line TTP
Journal of Computer Security - On IWAP'05
Smart card-based agents for fair non-repudiation
Computer Networks: The International Journal of Computer and Telecommunications Networking
MobiDE '07 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access
A methodology for verification of digital items in fair exchange protocols with active trustee
Electronic Commerce Research
Exclusions and related trust relationships in multi-party fair exchange protocols
Electronic Commerce Research and Applications
An optimistic fair exchange protocol and its security in the universal composability framework
International Journal of Applied Cryptography
Dandelion: cooperative content distribution with robust incentives
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components
Electronic Commerce Research and Applications
Designing a secure e-tender submission protocol
Electronic Commerce Research
Multiparty nonrepudiation: A survey
ACM Computing Surveys (CSUR)
Non-repudiation Mechanism of Agent-Based Mobile Payment Systems: Perspectives on Wireless PKI
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
A new fair non-repudiation protocol for secure negotiation and contract signing
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
A generalised model of e-trading for gradual secret release fair exchange protocol
International Journal of Electronic Security and Digital Forensics
Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder
Formal Aspects in Security and Trust
A Non-repudiated Self-service Store System Based on Portable Trusted Device
Wireless Personal Communications: An International Journal
Generic Fair Non-Repudiation Protocols with Transparent Off-line TTP
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Distributed support for public and private accountability in digital ecosystems
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Some common attacks against certified email protocols and the countermeasures
Computer Communications
A new dependable exchange protocol
Computer Communications
A fair and secure mobile billing system
Computer Networks: The International Journal of Computer and Telecommunications Networking
A secure on-line software transaction scheme
Computer Standards & Interfaces
Analysis and improvement of fair certified e-mail delivery protocol
Computer Standards & Interfaces
A Bulk Email Oriented Multi-party Non-repudiation Exchange Protocol
WISM '09 Proceedings of the International Conference on Web Information Systems and Mining
Modeling A Certified Email Protocol using I/O Automata
Electronic Notes in Theoretical Computer Science (ENTCS)
Standards and verification for fair-exchange and atomicity in e-commerce transactions
Information Sciences: an International Journal
A fair accountability protocol and its security properties analysis
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Deciding strategy properties of contract-signing protocols
ACM Transactions on Computational Logic (TOCL)
Optimistic non-repudiation protocol analysis
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
On fairness in exchange protocols
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
An abuse-free fair contract-signing protocol based on the RSA signature
IEEE Transactions on Information Forensics and Security
A theorem-proving approach to verification of fair non-repudiation protocols
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
On-the-fly model checking of fair non-repudiation protocols
ATVA'07 Proceedings of the 5th international conference on Automated technology for verification and analysis
Risk balance in exchange protocols
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
SETNR/A: an agent-based secure payment protocol for mobile commerce
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
Estimation of TTP features in non-repudiation service
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Non-repudiation analysis using LySa with annotations
Computer Languages, Systems and Structures
SETNR/A: an agent-based secure payment protocol for mobile commerce
International Journal of Intelligent Information and Database Systems
Accountability: definition and relationship to verifiability
Proceedings of the 17th ACM conference on Computer and communications security
An agent-mediated fair exchange protocol
ICICS'10 Proceedings of the 12th international conference on Information and communications security
A new method for formalizing optimistic fair exchange protocols
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Hi-index | 0.00 |
Abstract: A fair non-repudiation protocol should not give the sender of a message an advantage over the receiver, or vice versa. We present a fair non-repudiation protocol that requires a trusted third party but attempts to minimize its involvement in the execution of the protocol. We draw particular attention to the nonstandard use of encryption in our protocol and discuss some aspects of its formal verification.