Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
Certified E-Mail Protocol in the ID-Based Setting
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Information and Software Technology
An ID-Based verifiable encrypted signature scheme based on hess’s scheme
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
RSA extended modulus attacks and their solutions in a kind of fair exchange protocols
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
A formal analysis of fairness and non-repudiation in the RSA-CEGD protocol
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
An efficient certified email protocol
ISC'07 Proceedings of the 10th international conference on Information Security
Hi-index | 0.00 |
This paper presents an efficient security protocolfor certified e-goods delivery with the followingfeatures: (1) ensures strong fairness, (2) ensures non-repudiationof origin and non-repudiation of receipt,(3) allows the receiver of an e-goods to verify, duringthe protocol execution, that the e-goods he is about toreceive is the one he is signing the receipt for, (4) doesnot require the active involvement of a fully trustedthird party, but rather an off-line and transparentsemi-trusted third party (STTP) only in cases of unfairbehaviour by any party, and (5) providesconfidentiality protection for the exchanged items fromthe STTP.