Secure Multi-Party Non-Repudiation Protocols and Applications Secure Multi-Party Non-Repudiation Protocols and Applications
Advances in Information Security

Secure Multi-Party Non-Repudiation Protocols and Applications

    • 119,99 €
    • 119,99 €

Beschreibung des Verlags

Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement.


This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications.This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications.


Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography.This book is also suitable as an advanced-level text or reference book for students in computer science.

GENRE
Computer und Internet
ERSCHIENEN
2008
31. Oktober
SPRACHE
EN
Englisch
UMFANG
208
Seiten
VERLAG
Springer US
ANBIETERINFO
Springer Science & Business Media LLC
GRÖSSE
1,8
 MB
Collaborative Financial Infrastructure Protection Collaborative Financial Infrastructure Protection
2012
Bootstrapping Trust in Modern Computers Bootstrapping Trust in Modern Computers
2011
Information Security Information Security
2021
Software Architecture by Example Software Architecture by Example
2022
PacketCable Implementation PacketCable Implementation
2007
Global Initiatives to Secure Cyberspace Global Initiatives to Secure Cyberspace
2008
Primality Testing and Integer Factorization in Public-Key Cryptography Primality Testing and Integer Factorization in Public-Key Cryptography
2009
Security and Dependability for Ambient Intelligence Security and Dependability for Ambient Intelligence
2009
Cyber Situational Awareness Cyber Situational Awareness
2009
Network Intrusion Detection and Prevention Network Intrusion Detection and Prevention
2009
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009