5,999 Hits in 5.7 sec

Revisiting Cloud Security Threats: Repudiation Attack

2020 International journal of recent technology and engineering  
The study has tried to figure out the root cause of repudiation attack in order to come up with more suitable and satisfactory counter measures.  ...  The study also focuses on a variety of dimensions for future research study in the domain of repudiation based on the previous published works and industry /organization reports.  ...  on message originator at non-repudiation of origin (NRO).  ... 
doi:10.35940/ijrte.e6377.018520 fatcat:kpqvndgft5ghhk2yxhgg2jv4tm

A proposed architecture for secure two-party mobile payment

J. E. Rice, Y. Zhu
2009 2009 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing  
These are coupled with a transaction log strategy to satisfy the properties of confidentiality, authentication, integrity and non-repudiation.  ...  The evolution of wireless networks and mobile devices has resulted in increased concerns about performance and security of mobile payment systems.  ...  Along with the digital signature a transaction log strategy is used to ensure non-repudiation.  ... 
doi:10.1109/pacrim.2009.5291393 fatcat:iukuwz7uqrgu3mack4fy3fuoom

Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications [chapter]

Philippe De Ryck, Lieven Desmet, Wouter Joosen
2011 Lecture Notes in Computer Science  
, such as end-to-end data protection, non-repudiation or patient consent management.  ...  We both evaluate the security of the middleware and present a case study and prototype implementation, which show how the complexities of a web architecture can be dealt with while limiting the integration  ...  The generic middleware layer counts 3219 lines of code, the non-repudiation support layer counts 1407 lines and the specific protocol implementation, in the form of state machines, counts 4294 lines.  ... 
doi:10.1007/978-3-642-19125-1_9 fatcat:wt42h4tdwbh4rk7lu5uakblgjq


2006 International Journal of Cooperative Information Systems  
This paper introduces a flexible framework to support fair non-repudiable B2B interactions based on a trusted delivery agent. A Web services implementation is presented.  ...  Accountability and acknowledgment can be achieved by the systematic maintenance of an irrefutable audit trail to render the interaction non-repudiable.  ...  /S63199: "Trusted Coordination in Dynamic Virtual Organizations"; and by the European Union under Project IST-2001-34069: "TAPAS (Trusted and QoS-Aware Provision of Application Services)".  ... 
doi:10.1142/s0218843006001499 fatcat:zfo5wo3pxzdhbe4uwwuza5pp2i

Component middleware to support non-repudiable service interactions

N. Cook, P. Robinson, S. Shrivastava
2004 International Conference on Dependable Systems and Networks, 2004  
Key mechanisms to facilitate such regulated interactions are the collection and verification of non-repudiable evidence of the actions of the parties to the CS.  ...  These mechanisms may be incorporated in the service delivery platforms at each organisation or at one or more trusted third parties who offer non-repudiation services, or some combination of these options  ...  We thank our colleague Paul Ezhilchelvan for useful discussion of this work.  ... 
doi:10.1109/dsn.2004.1311931 dblp:conf/dsn/CookRS04 fatcat:icclfmclpzge3hevmnslcsnjd4

A Secure Communication Method Based on Message Hash Chain

Mingxuan Han, Wenbao Jiang
2022 Applied Sciences  
However, it is about 5% higher than the average transmission efficiency of the non-repudiation IPSec protocol communication method.  ...  It is easier to ensure the non-repudiation of the data stream.  ...  non-repudiation.  ... 
doi:10.3390/app12094505 fatcat:yxz6hjhbtzakjbpdzvwkjoym4m

Unconditionally secure digital signatures implemented in an 8-user quantum network [article]

Yoann Pelet, Ittoop Vergheese Puthoor, Natarajan Venkatachalam, Sören Wengerowsky, Martin Lončarić, Sebastian Philipp Neumann, Bo Liu, Željko Samec, Mario Stipčević, Rupert Ursin, Erika Andersson, John G. Rarity (+2 others)
2022 arXiv   pre-print
Our USS protocol is secure against forging, repudiation and messages are transferrable.  ...  world scenarios with varying message lengths.  ...  We would like to thank Thomas Scheidl for help with the software used to run the original experiment and Mohsen Razavi & Guillermo Currás Lorenzo for their help proving the security of the implementation  ... 
arXiv:2202.04641v2 fatcat:yjs5awziszhtdfkuo65fh2rsqe

SecAdvise: A Security Mechanism Advisor [chapter]

Rima Saliba, Gilbert Babin, Peter Kropf
2002 Lecture Notes in Computer Science  
dynamic selection of the various mechanisms between several parties wishing to conduct business transactions safely.  ...  The proliferation of incompatible e-commerce systems applying different security technologies imposes difficult choices on all the concerned parties.  ...  For connection oriented protocols they may provide message recovery (transport layer). Data integrity services can also protect selected fields of messages only. -Non-repudiation.  ... 
doi:10.1007/3-540-36261-4_5 fatcat:zrlzihf5gjhwfjd5wnebikdlqa

Design and Implementation of a Secure Modbus Protocol [chapter]

Igor Nai Fovino, Andrea Carcano, Marcelo Masera, Alberto Trombetta
2009 IFIP Advances in Information and Communication Technology  
This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms.  ...  The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure  ...  and message non-repudiation.  ... 
doi:10.1007/978-3-642-04798-5_6 fatcat:cansfir6ofgwzplmxrmgmuvveq

Security Enhancements in EMV Protocol for NFC Mobile Payment

Nour El Madhoun, Guy Pujolle
2016 2016 IEEE Trustcom/BigDataSE/ISPA  
Then, we propose a solution that enhances the EMV protocol by adding a new security layer aiming to solve EMV weaknesses.  ...  However, it does not ensure two main security proprieties: (1) the authentication of the payment terminal to the client's payment device, (2) the confidentiality of personal banking data.  ...  This message confirms: authenticity of P, non-repudiation for P and integrity of the message contained in SignP.  ... 
doi:10.1109/trustcom.2016.0289 dblp:conf/trustcom/MadhounP16 fatcat:vxjec2owv5gitd4b5sylh7zs7q

SCMCI: Secured Click and Mortar Commercial Interaction [article]

Mausumi Das Nath, Tapalina Bhattasali
2021 arXiv   pre-print
Comparative analysis has been done with traditional SET protocol using cryptool to prove the efficiency of the protocol.  ...  Our aim is here to design a protocol to secure any type of commercial interaction for online platform, which also considers mobile platform.  ...  The security features of authentication, confidentiality, message integrity, and non-repudiation can be met to a certain extent by implement- ing the SET (Secure Electronic Transaction) protocol, particularly  ... 
arXiv:2112.02634v1 fatcat:cjtevdf2ebajxkfvibcdxyvuay

Implementation Of Ssl Using Information Security Component Interface

Jong-Whoi Shin, Chong-Sun Hwang
2007 Zenodo  
To resolve this problem, we propose the standard draft of the information security component, while SSL (Secure Sockets Layer) using the confidentiality and integrity component interface has been implemented  ...  one more layer on the TCP/IP.  ...  Non-repudiation service component This component is used to prevent the repudiation of a transmission and its content between the sender and receiver. It provides the authentication service function.  ... 
doi:10.5281/zenodo.1075854 fatcat:4oppp7lqgjggdnlctjc6y72fim

A Secure Mobile Learning Framework based on Cloud

Mohammad Al
2017 International Journal of Advanced Computer Science and Applications  
With the rising need for highly advanced and digital learning coupled with the growing penetration of smartphones has contributed to the growth of Mobile Learning.  ...  Proposed SMLF ensures mutual authentication of all the stakeholders, privacy of the message, integrity of the message, and anonymity of the student from the instructor and nonrepudiation and is free from  ...  among the stakeholders should not be altered, so Message integrity property should be ensured for all the messages exchanged among the stakeholders. 4) Non-Repudiation: Non-repudiation property should  ... 
doi:10.14569/ijacsa.2017.081002 fatcat:darta6wvajakjoqdlw6kk67hg4

Non-repudiation Mechanism of Agent-Based Mobile Payment Systems: Perspectives on Wireless PKI [chapter]

Chung-Ming Ou, C. R. Ou
2007 Lecture Notes in Computer Science  
Combining these motivations, we propose an agent-based architecture and protocol to implement non-repudiation mechanism over the mobile payment systems; this will improve security mechanisms of those existing  ...  Non-repudiation of a mobile payment transaction ensures that when a buyer (B) sends some messages to a seller (S), neither B nor S can deny having participated in this transaction.  ...  Security of Agent-based Non-repudiation Protocol The most important security issue of a non-repudiation protocol is the dispute resolution.  ... 
doi:10.1007/978-3-540-72830-6_31 fatcat:76qqdzxjefexrm7bf6pwrnixcy


Esha Rani
2017 International Journal of Advanced Research in Computer Science  
The rest of this paper is organized as follows. In Section II we will give the brief description of MANETs and IEEE802.11. Section III will introduce about the different types of routing protocols.  ...  At last, we conclude with recommendation plans for future work in Section VI.  ...  Non Repudiation Non-repudiation does not allow the sender of a message to refute the claim of not sending that message.  ... 
doi:10.26483/ijarcs.v8i7.4491 fatcat:yqygurgtljf6tee5wlkl7m3twq
« Previous Showing results 1 — 15 out of 5,999 results