Non-repudiation

Results: 58



#Item
1TLS-N: Non-repudiation over TLS Enabling Ubiquitous Content Signing for Disintermediation Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Čapkun Department of Computer Science ETH Zurich, Switzerla

TLS-N: Non-repudiation over TLS Enabling Ubiquitous Content Signing for Disintermediation Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Čapkun Department of Computer Science ETH Zurich, Switzerla

Add to Reading List

Source URL: chainsecurity.com

Language: English - Date: 2018-08-14 18:06:16
    2Key-collisions in (EC)DSA: Attacking Non-repudiation* Tomáš Rosa http://crypto.hyperlink.cz, email:  Abstract. A new kind of attack on the non-repudiation property of digital signature schemes is present

    Key-collisions in (EC)DSA: Attacking Non-repudiation* Tomáš Rosa http://crypto.hyperlink.cz, email: Abstract. A new kind of attack on the non-repudiation property of digital signature schemes is present

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2004-01-10 08:28:36
      3Non-repudiation analysis using LySa with annotations

      Non-repudiation analysis using LySa with annotations

      Add to Reading List

      Source URL: www.dsi.unive.it

      - Date: 2010-06-21 03:54:14
        4

        PDF Document

        Add to Reading List

        Source URL: notary.delaware.gov

        Language: English - Date: 2015-07-28 10:16:22
        5(full paper)  Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder Francis Klay1 and Laurent Vigneron2

        (full paper) Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder Francis Klay1 and Laurent Vigneron2

        Add to Reading List

        Source URL: www.lsv.ens-cachan.fr

        Language: English - Date: 2008-09-22 11:28:24
          6Abhinav International Monthly Refereed Journal of Research In Management & Technology Volume II, March’13 ISSN –

          Abhinav International Monthly Refereed Journal of Research In Management & Technology Volume II, March’13 ISSN –

          Add to Reading List

          Source URL: www.abhinavjournal.com

          Language: English - Date: 2013-12-17 06:25:33
          7This rule was filed as 1 NMACTITLE 1 CHAPTER 12 PART 7  GENERAL GOVERNMENT

          This rule was filed as 1 NMACTITLE 1 CHAPTER 12 PART 7 GENERAL GOVERNMENT

          Add to Reading List

          Source URL: www.doit.state.nm.us

          Language: English - Date: 2009-11-05 18:43:35
          8

          PDF Document

          Add to Reading List

          Source URL: www.meganet.com

          Language: English - Date: 2014-10-24 18:01:39
          9Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing Dan Wendlandt David G. Andersen Adrian Perrig Carnegie Mellon University  Abstract

          Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing Dan Wendlandt David G. Andersen Adrian Perrig Carnegie Mellon University Abstract

          Add to Reading List

          Source URL: static.usenix.org

          Language: English - Date: 2008-05-29 17:15:02
          10

          PDF Document

          Add to Reading List

          Source URL: www.meganet.com

          Language: English - Date: 2014-10-24 18:01:38