Filters








6,128 Hits in 2.8 sec

Automatic Analysis of a Non-Repudiation Protocol

Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina
2005 Electronical Notes in Theoretical Computer Science  
We define a probabilistic model for the analysis of a Non-Repudiation protocol that guarantees fairness, without resorting to a trusted third party, by means of a probabilistic algorithm.  ...  By using the PRISM model checker, we estimate the probability for a malicious user to break the non-repudiation property, depending on various parameters of the protocol.  ...  A Probabilistic Non-Repudiation Protocol In this section we describe a protocol that guarantees a non-repudiation service with a certain probability without resorting to a trusted third party [13] .  ... 
doi:10.1016/j.entcs.2004.01.020 fatcat:wp4u4rbkhjbndhf6s6ukrfmb6y

Analyzing for Fairness Electronic Commerce Protocol Formally

MEI ZHANG, FEI FENG, ZHI-LONG ZHANG, JING-HUA WEN
2018 DEStech Transactions on Computer Science and Engineering  
A new approach is proposed for analyzing fairness and non-repudiation of electronic commerce protocols in this paper.  ...  The Analysis shows that, the certified electronic mail protocol is unfair, so we need to improve it.  ...  The definition of fairness is as follows: Definition 1: That a non-repudiation protocol is fair means that the protocol can provide the sender and the receiver respectively valid non-repudiation evidence  ... 
doi:10.12783/dtcse/cmsms2018/25239 fatcat:qkha4g6vavhfdi3lignqqtqzui

Formal Analysis of a Fairness E-Commerce Protocol

Mei Zhang, Jing-Hua Wen
2013 Research Journal of Applied Sciences Engineering and Technology  
In this study, a new approach is proposed for analyzing non-repudiation and fairness of E-commerce protocols.  ...  The authentication E-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects-non-repudiation and fairness using SMV.  ...  After analysis we found that after the third step of the protocol has been executed, the receiver B has received the senders' non-repudiation evidence POO.  ... 
doi:10.19026/rjaset.6.3866 fatcat:4lddfigenjbunleyceq5sohql4

Optimistic Non-repudiation Protocol Analysis [chapter]

Judson Santiago, Laurent Vigneron
2007 Lecture Notes in Computer Science  
Non-repudiation protocols with session labels have a number of vulnerabilities.  ...  Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that avoids altogether the use of session labels.  ...  The fairness of a non-repudiation protocol is a property difficult to analyse and there are very few tools that can handle the automatic analysis of this property.  ... 
doi:10.1007/978-3-540-72354-7_8 fatcat:ejxr2s3bgneo5gr53sdmabcrbi

Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder [article]

Francis Klay, Laurent Vigneron
2007 arXiv   pre-print
In this purpose, we show how to partially represent non-repudiation as a combination of authentications on the Fair Zhou-Gollmann protocol.  ...  Non-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary.  ...  The fairness of a non-repudiation protocol is a property difficult to analyze and there are very few tools that can handle the automatic analysis of this property.  ... 
arXiv:0710.3305v2 fatcat:w6gj67eb6jawvezxoffoboupse

Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder [chapter]

Francis Klay, Laurent Vigneron
2009 Lecture Notes in Computer Science  
In this purpose, we show how to partially represent non-repudiation as a combination of authentications on the Fair Zhou-Gollmann protocol.  ...  Non-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary.  ...  The fairness of a non-repudiation protocol is a property difficult to analyze and there are very few tools that can handle the automatic analysis of this property.  ... 
doi:10.1007/978-3-642-01465-9_13 fatcat:amx7s6mzavax3eqo6m7i4x3uci

Improvement of Fairness in E-cash Protocol

Dr. Khin Khat Khat Kyaw
2019 International Journal of Science and Engineering Applications  
Therefore, a modified e-cash protocol is proposed in this paper. The proposed protocol also maintains anonymity and non-repudiation.  ...  So, this paper presents analysis of the original e-cash protocol and modified protocol by using AVISPA tool.  ...  Security Analysis of the Original Protocol Figure 2 . 2 Figure 2. Security Analysis of Proposed Protocol 1 . 1 A→ES: E-goods, Cost, Account ES , e t , n t , v, s, Time A ,Sign t 2.  ... 
doi:10.7753/ijsea0808.1024 fatcat:me2yuf262ndm3koio5nbbyvvue

Security protocols analysis: A SDL-based approach

Javier Lopez, Juan J. Ortega, Jose M. Troya
2005 Computer Standards & Interfaces  
In order to study the security of communication systems, we have developed a methodology for the application of the formal analysis techniques, commonly used in communication protocols, to the analysis  ...  of cryptographic protocols.  ...  Non-repudiation uses signature mecha-nisms and a trusted notary. We will distinguish two types of non-repudiation services: non-repudiation of origin (NRO) and non-repudiation of receipt (NRR).  ... 
doi:10.1016/j.csi.2005.01.007 fatcat:wpmcoh5n5vcbhdnw3p7irv7szq

Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications [chapter]

Philippe De Ryck, Lieven Desmet, Wouter Joosen
2011 Lecture Notes in Computer Science  
, such as end-to-end data protection, non-repudiation or patient consent management.  ...  We both evaluate the security of the middleware and present a case study and prototype implementation, which show how the complexities of a web architecture can be dealt with while limiting the integration  ...  One example in the field of web services is a transparent non-repudiation service [1] , which executes a non-repudiation protocol in the background.  ... 
doi:10.1007/978-3-642-19125-1_9 fatcat:wt42h4tdwbh4rk7lu5uakblgjq

Accountability protocols

Giampaolo Bella, Lawrence C. Paulson
2006 ACM Transactions on Privacy and Security  
Accountability underlies the non-repudiation protocol of Zhou and Gollmann and the certified e-mail protocol of Abadi et al.  ...  A byproduct is an account of the concept of higher-level protocol.  ...  The non-repudiation protocol The non-repudiation protocol (Fig. 1 ) uses a lightweight TTP whose effort is independent of the size of the transmitted message.  ... 
doi:10.1145/1151414.1151416 fatcat:zb7br5ep3jh3bhgbyxmlreuzd4

Security Analysis of (Un-) Fair Non-repudiation Protocols [chapter]

Sigrid Gürgens, Carsten Rudolph
2003 Lecture Notes in Computer Science  
non-repudiation protocol and on two more recent optimistic fair non-repudiation protocols.  ...  An approach to protocol analysis using asynchronous product automata (APA) and the simple homomorphism verification tool (SHVT) is demonstrated on several variants of the well known Zhou-Gollmann fair  ...  Furthermore, the attack scenario for the analysis of fair non-repudiation protocols is different.  ... 
doi:10.1007/978-3-540-40981-6_10 fatcat:2j2ylca5yneibmkynbkxt3ukyu

Security Protocol for Data Transmission in Cloud Computing

Dr. Abdelrahman ElSharif Karrar
2018 International Journal of Advanced Trends in Computer Science and Engineering  
Therefore, we need a protocol that verifies confidentiality, authenticity, integrity, and non-repudiation of data transmission in the cloud.  ...  Additionally, we used a hash function to verify data integrity. Finally, data authenticity and non-repudiation have been verified by applying the digital signature mechanism.  ...  The proposed protocol aims to secure data transmission in cloud computing and verifies data confidentiality, authenticity, integrity, and non-repudiation.  ... 
doi:10.30534/ijatcse/2018/01712018 fatcat:sehknosk2bdpzgfxip6irlwbzi

Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems

Yuxiu Luo, Giannakis Antoniou, Leon Sterling
2007 Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007)  
A communication protocol is a fundamental component of a multi-agent system.  ...  The security requirements for a communication protocol should be articulated during the early stages of software development.  ...  Digital signature (DS) achieves non-repudiation and integrity of the message and the authentication of the sender.  ... 
doi:10.1109/pdcat.2007.4420159 fatcat:hwjepswrxjck3nofooywfqqfuq

Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems

Yuxiu Luo, Giannakis Antoniou, Leon Sterling
2007 Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007)  
A communication protocol is a fundamental component of a multi-agent system.  ...  The security requirements for a communication protocol should be articulated during the early stages of software development.  ...  Digital signature (DS) achieves non-repudiation and integrity of the message and the authentication of the sender.  ... 
doi:10.1109/pdcat.2007.48 dblp:conf/pdcat/LuoAS07 fatcat:bhsfsebzczd2vacffzpmg4xi4a

Some guidelines for non-repudiation protocols

Panagiotis Louridas
2000 Computer communication review  
We identify some guidelines for nonrepudiation protocols. The guidelines are derived by examining a series of non-repudiation protocols that descend from a single ancestor.  ...  Non-repudiation protocols aim at preventing parties in a communication from falsely denying having taken part in that communication; for example, a non-repudiation protocol for digital certified mail should  ...  A number of non-repudiation protocols purporting to be fair, in general, have been proposed. In § 2 we introduce the main ideas.  ... 
doi:10.1145/505672.505676 fatcat:ei3w44gpqraelmte2xqwdcwuq4
« Previous Showing results 1 — 15 out of 6,128 results