A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Automatic Analysis of a Non-Repudiation Protocol
2005
Electronical Notes in Theoretical Computer Science
We define a probabilistic model for the analysis of a Non-Repudiation protocol that guarantees fairness, without resorting to a trusted third party, by means of a probabilistic algorithm. ...
By using the PRISM model checker, we estimate the probability for a malicious user to break the non-repudiation property, depending on various parameters of the protocol. ...
A Probabilistic Non-Repudiation Protocol In this section we describe a protocol that guarantees a non-repudiation service with a certain probability without resorting to a trusted third party [13] . ...
doi:10.1016/j.entcs.2004.01.020
fatcat:wp4u4rbkhjbndhf6s6ukrfmb6y
Analyzing for Fairness Electronic Commerce Protocol Formally
2018
DEStech Transactions on Computer Science and Engineering
A new approach is proposed for analyzing fairness and non-repudiation of electronic commerce protocols in this paper. ...
The Analysis shows that, the certified electronic mail protocol is unfair, so we need to improve it. ...
The definition of fairness is as follows: Definition 1: That a non-repudiation protocol is fair means that the protocol can provide the sender and the receiver respectively valid non-repudiation evidence ...
doi:10.12783/dtcse/cmsms2018/25239
fatcat:qkha4g6vavhfdi3lignqqtqzui
Formal Analysis of a Fairness E-Commerce Protocol
2013
Research Journal of Applied Sciences Engineering and Technology
In this study, a new approach is proposed for analyzing non-repudiation and fairness of E-commerce protocols. ...
The authentication E-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects-non-repudiation and fairness using SMV. ...
After analysis we found that after the third step of the protocol has been executed, the receiver B has received the senders' non-repudiation evidence POO. ...
doi:10.19026/rjaset.6.3866
fatcat:4lddfigenjbunleyceq5sohql4
Optimistic Non-repudiation Protocol Analysis
[chapter]
2007
Lecture Notes in Computer Science
Non-repudiation protocols with session labels have a number of vulnerabilities. ...
Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that avoids altogether the use of session labels. ...
The fairness of a non-repudiation protocol is a property difficult to analyse and there are very few tools that can handle the automatic analysis of this property. ...
doi:10.1007/978-3-540-72354-7_8
fatcat:ejxr2s3bgneo5gr53sdmabcrbi
Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder
[article]
2007
arXiv
pre-print
In this purpose, we show how to partially represent non-repudiation as a combination of authentications on the Fair Zhou-Gollmann protocol. ...
Non-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary. ...
The fairness of a non-repudiation protocol is a property difficult to analyze and there are very few tools that can handle the automatic analysis of this property. ...
arXiv:0710.3305v2
fatcat:w6gj67eb6jawvezxoffoboupse
Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder
[chapter]
2009
Lecture Notes in Computer Science
In this purpose, we show how to partially represent non-repudiation as a combination of authentications on the Fair Zhou-Gollmann protocol. ...
Non-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary. ...
The fairness of a non-repudiation protocol is a property difficult to analyze and there are very few tools that can handle the automatic analysis of this property. ...
doi:10.1007/978-3-642-01465-9_13
fatcat:amx7s6mzavax3eqo6m7i4x3uci
Improvement of Fairness in E-cash Protocol
2019
International Journal of Science and Engineering Applications
Therefore, a modified e-cash protocol is proposed in this paper. The proposed protocol also maintains anonymity and non-repudiation. ...
So, this paper presents analysis of the original e-cash protocol and modified protocol by using AVISPA tool. ...
Security Analysis of the Original Protocol
Figure 2 . 2 Figure 2. Security Analysis of Proposed Protocol
1 . 1 A→ES: E-goods, Cost, Account ES , e t , n t , v, s, Time A ,Sign t 2. ...
doi:10.7753/ijsea0808.1024
fatcat:me2yuf262ndm3koio5nbbyvvue
Security protocols analysis: A SDL-based approach
2005
Computer Standards & Interfaces
In order to study the security of communication systems, we have developed a methodology for the application of the formal analysis techniques, commonly used in communication protocols, to the analysis ...
of cryptographic protocols. ...
Non-repudiation uses signature mecha-nisms and a trusted notary. We will distinguish two types of non-repudiation services: non-repudiation of origin (NRO) and non-repudiation of receipt (NRR). ...
doi:10.1016/j.csi.2005.01.007
fatcat:wpmcoh5n5vcbhdnw3p7irv7szq
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications
[chapter]
2011
Lecture Notes in Computer Science
, such as end-to-end data protection, non-repudiation or patient consent management. ...
We both evaluate the security of the middleware and present a case study and prototype implementation, which show how the complexities of a web architecture can be dealt with while limiting the integration ...
One example in the field of web services is a transparent non-repudiation service [1] , which executes a non-repudiation protocol in the background. ...
doi:10.1007/978-3-642-19125-1_9
fatcat:wt42h4tdwbh4rk7lu5uakblgjq
Accountability protocols
2006
ACM Transactions on Privacy and Security
Accountability underlies the non-repudiation protocol of Zhou and Gollmann and the certified e-mail protocol of Abadi et al. ...
A byproduct is an account of the concept of higher-level protocol. ...
The non-repudiation protocol The non-repudiation protocol (Fig. 1 ) uses a lightweight TTP whose effort is independent of the size of the transmitted message. ...
doi:10.1145/1151414.1151416
fatcat:zb7br5ep3jh3bhgbyxmlreuzd4
Security Analysis of (Un-) Fair Non-repudiation Protocols
[chapter]
2003
Lecture Notes in Computer Science
non-repudiation protocol and on two more recent optimistic fair non-repudiation protocols. ...
An approach to protocol analysis using asynchronous product automata (APA) and the simple homomorphism verification tool (SHVT) is demonstrated on several variants of the well known Zhou-Gollmann fair ...
Furthermore, the attack scenario for the analysis of fair non-repudiation protocols is different. ...
doi:10.1007/978-3-540-40981-6_10
fatcat:2j2ylca5yneibmkynbkxt3ukyu
Security Protocol for Data Transmission in Cloud Computing
2018
International Journal of Advanced Trends in Computer Science and Engineering
Therefore, we need a protocol that verifies confidentiality, authenticity, integrity, and non-repudiation of data transmission in the cloud. ...
Additionally, we used a hash function to verify data integrity. Finally, data authenticity and non-repudiation have been verified by applying the digital signature mechanism. ...
The proposed protocol aims to secure data transmission in cloud computing and verifies data confidentiality, authenticity, integrity, and non-repudiation. ...
doi:10.30534/ijatcse/2018/01712018
fatcat:sehknosk2bdpzgfxip6irlwbzi
Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems
2007
Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007)
A communication protocol is a fundamental component of a multi-agent system. ...
The security requirements for a communication protocol should be articulated during the early stages of software development. ...
Digital signature (DS) achieves non-repudiation and integrity of the message and the authentication of the sender. ...
doi:10.1109/pdcat.2007.4420159
fatcat:hwjepswrxjck3nofooywfqqfuq
Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems
2007
Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007)
A communication protocol is a fundamental component of a multi-agent system. ...
The security requirements for a communication protocol should be articulated during the early stages of software development. ...
Digital signature (DS) achieves non-repudiation and integrity of the message and the authentication of the sender. ...
doi:10.1109/pdcat.2007.48
dblp:conf/pdcat/LuoAS07
fatcat:bhsfsebzczd2vacffzpmg4xi4a
Some guidelines for non-repudiation protocols
2000
Computer communication review
We identify some guidelines for nonrepudiation protocols. The guidelines are derived by examining a series of non-repudiation protocols that descend from a single ancestor. ...
Non-repudiation protocols aim at preventing parties in a communication from falsely denying having taken part in that communication; for example, a non-repudiation protocol for digital certified mail should ...
A number of non-repudiation protocols purporting to be fair, in general, have been proposed. In § 2 we introduce the main ideas. ...
doi:10.1145/505672.505676
fatcat:ei3w44gpqraelmte2xqwdcwuq4
« Previous
Showing results 1 — 15 out of 6,128 results