A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
A non-repudiation metering scheme
2001
IEEE Communications Letters
In this letter, we propose an efficient metering scheme that incorporates the hash-chaining technique and the digital signature algorithm to provide a nonrepudiation proof of this measured number. ...
A metering scheme enables a web server to measure the number of visits from clients. In addition, a proof needs to be presented by the server as evidence corresponding to this measured number. ...
The combination of and the digital signature of can be used as a nonrepudiation proof by the server as evidence of visits made by the client. ...
doi:10.1109/4234.974494
fatcat:jrcq3j3tvrg7fjgmhcwy5rjbrq
Authentication protocols with nonrepudiation services in personal communication systems
1999
IEEE Communications Letters
Through the combination of the public-key digital signature and the hash-chaining techniques, a new set of authentication protocols is proposed with the capability of arbitrating disputed bills. ...
They also help identify whether an accounting error, an internal fraud, or a security breach of the service provider causes the incorrect service charge. ...
Authentication Protocols with Nonrepudiation Services in Personal Communication Systems
Hung-Yu Lin and Lein Harn Abstract-Through the combination of the public-key digital signature and the hash-chaining ...
doi:10.1109/4234.781006
fatcat:i5bxwx363ndofld6vao2l4odpe
Paper-based Verification Design of Trade Business License in Indonesia
2016
TELKOMNIKA (Telecommunication Computing Electronics and Control)
Our design implemented digital signature with QR Code image that placed into the document and the digital certificate issued by a certification authority (CA). ...
The proposed scheme generated 442 Bytes of data and version 14 of QR Code to scan easily by a reader device. ...
One of the algorithms of the digital signature is digital signature algorithm (DSA) which has O(n) complexity [4] . ...
doi:10.12928/telkomnika.v14i4.2915
fatcat:qjfbrw6byzfw3if6yaougyzu5q
Cryptanalysis and improvement of signcryption schemes
1998
IEE Proceedings - Computers and digital Techniques
In fact, the way to gain nonrepudiation violates the confidentiality. Moreover, we compare the schemes to previously known authenticated encryption schemes, which were not mentioned by Zheng. ...
Therefore, to gain nonrepudiation in case of a dispute, a judge must be convinced by the verifier Bob, that the signature was issued by the signer Alice. ...
However, it must be taken care that the separation of the signature and the ciphertext is avoided. ...
doi:10.1049/ip-cdt:19981862
fatcat:cajxlinfwba3fgio66if3amxp4
On the validity of digital signatures
2000
Computer communication review
An important feature of digital signatures is to serve as nonrepudiation evidence. ...
As signature keys may be compromised and the validity of signatures may become questionable, additional security mechanisms need to be imposed on digital signatures. ...
DIGITAL VS HAND-WRITTEN SIGNA-TURE The concept of digital signature, which was invented by Diffie and Hellman [4] , forms an important basis for nonrepudiation services. ...
doi:10.1145/505680.505684
fatcat:pvd3cde4obdj7o4a7prdam6rhq
Cryptanalysis and improvement of Petersen–Michels signcryption scheme
1999
IEE Proceedings - Computers and digital Techniques
Petersen and Michels showed that Zheng's signcryption schemes lose confidentiality to gain nonrepudiation. ...
They also proposed another signcryption scheme modified from a signature scheme giving message recovery. ...
Introduction At the Crypto'97 conference, Zheng [l] introduced a new type of cryptographic primitive termed 'signcryption', in which message encryption and digital signature are simultaneously fulfilled ...
doi:10.1049/ip-cdt:19990198
fatcat:3634jk7gzjalbnoog6g7ms6kva
Page 252 of American Society of Civil Engineers. Collected Journals Vol. 127, Issue 4
[page]
2001
American Society of Civil Engineers. Collected Journals
Digitized sig- natures are being evaluated as a legal alternative (Phair 2001) for handwritten signatures in several states (Perkins) and hence would provide nonrepudiation in the case of legal claims ...
Digitized” signatures are the electronic equivalent of hand- written signatures, which can be embedded into documents. ...
CCITT/ISO standards for secure message handling
1989
IEEE Journal on Selected Areas in Communications
The paper concludes with a discussion of certain limitations of the current X.400 security architecture. ...
A brief introduction to relevant cryptographic concepts is followed by a description of how some of the security services may be provided. ...
This fundamental property of digital signatures is the basis for all the nonrepudiation services in the X .400 recommendations. ...
doi:10.1109/49.17715
fatcat:bd3cuvag4fafbc2kjffl7hwbq4
Using cryptographic and. watermarking algorithms
2001
IEEE Multimedia
We also survey revocation methods for digital certificates and introduce a mediaindependent classification scheme. 54 ...
We introduce the most important security requirements for all types of multimedia systems. ...
We presented a preliminary version of parts of this article at the 2000 ACM Workshop on Multimedia and Security 38 and at the special session on Multimedia and Security at the IEEE International Conference ...
doi:10.1109/93.959103
fatcat:yo3dmoxdkngfjhbmci6uvuuroy
On Delegatability of Some Strong Designated Verifier Signature Schemes
2014
Mathematical Problems in Engineering
signature to a third party, and no third party can even verify the validity of a designated verifier signature. ...
These schemes do not satisfy non delegatability secure requirement of strong designated verifier signature schemes. ...
A SDVS scheme is special type of digital signature which provides message authentication without nonrepudiation. ...
doi:10.1155/2014/761487
fatcat:3wblb4uhkrdlperouqqdz4efxu
A new family of authentication protocols
1998
ACM SIGOPS Operating Systems Review
Previously, one-time digital signatures based on hash functions involved hundreds of hash function computations for each signature; we show that given online access to a timestamping service, we can sign ...
In addition to being of potential use in real applications, our constructions also raise interesting questions about the definition of a digital signature, and the relationship between integrity and authenticity ...
In other words, the broadcast commitment step has the criticial effect of providing nonrepudiation, and gives the Guy Fawkes protocol the same effect as a digital signature. ...
doi:10.1145/302350.302353
fatcat:yx3jdrllivg25kp4mtuhgiykbe
XML, web services, and XML
2002
netWorker - Association for computing machinery
The important questions now, of course, involve not only the efficacy of these proposed systems, but whether anyone will actually use them. ...
Ever since the concept of "Web services" was defined, there have been questions about their security. ...
Some people advocate the use of XML Digital Signatures for nonrepudiation as well, but the infrastructure needed to support nonrepudiation turns out to be bigger than most organizations want to create. ...
doi:10.1145/569207.569215
fatcat:wqn5nghcazet7mw2arra5zvh7u
A Case (Study) For Usability in Secure Email Communication
2007
IEEE Security and Privacy
Acknowledgments The author thanks Scott Rea for his insightful comments and willingness to read multiple drafts of this article. ...
This package is called a digital signature and provides two basic properties: nonrepudiation and integrity. ...
In practice, however, digital signatures are a weak line of defense. ...
doi:10.1109/msp.2007.25
fatcat:knjkcxq5rjcshpopp2lpkhoyhy
Key Substitution Attacks on Lattice Signature Schemes Based on SIS Problem
2018
Security and Communication Networks
The notion of key substitution security on digital signatures in the multiuser setting has been proposed by Menezes and Smart in 2004. ...
Along with the unforgeability of signature, the key substitution security is very important since it is a critical requirement for the nonrepudiation and the authentication of the signature. ...
The US government standard for digital signatures states that nonrepudiation and authentication are main characteristics of a signature scheme [6] . ...
doi:10.1155/2018/8525163
fatcat:ktmzlmdunzcsddz2twwimx74je
Securing Wireless Body Area Network with Efficient Secure Channel Free and Anonymous Certificateless Signcryption
2021
Wireless Communications and Mobile Computing
WBAN technology is primarily used to offer continuous screening of health data to patients, independent of their location, time, or activity. ...
A WBAN, on the other hand, is vulnerable to different cyberattacks due to the openness of the wireless environment and the privacy of people's physiological data. ...
Conflicts of Interest The authors declare no conflicts of interest with respect to the research, authorship, and/or publication of this article. ...
doi:10.1155/2021/5986469
fatcat:2u666g4jfngjvo6xpjgbepgimm
« Previous
Showing results 1 — 15 out of 2,247 results