Secure Multi-Party Non-Repudiation Protocols and Applications Secure Multi-Party Non-Repudiation Protocols and Applications
Advances in Information Security

Secure Multi-Party Non-Repudiation Protocols and Applications

    • £84.99
    • £84.99

Publisher Description

Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement.


This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications.This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications.


Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography.This book is also suitable as an advanced-level text or reference book for students in computer science.

GENRE
Computing & Internet
RELEASED
2008
31 October
LANGUAGE
EN
English
LENGTH
208
Pages
PUBLISHER
Springer US
SIZE
1.8
MB
Security and Privacy in Mobile Information and Communication Systems Security and Privacy in Mobile Information and Communication Systems
2009
Principles of Protocol Design Principles of Protocol Design
2008
Accountability and Privacy in Network Security Accountability and Privacy in Network Security
2020
Security in Fixed and Wireless Networks Security in Fixed and Wireless Networks
2016
70 Tips and Tricks for Mastering the CISSP Exam 70 Tips and Tricks for Mastering the CISSP Exam
2020
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
2014
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber Denial, Deception and Counter Deception Cyber Denial, Deception and Counter Deception
2015
Insider Attack and Cyber Security Insider Attack and Cyber Security
2008
Cybersecurity for Network and Information Security Cybersecurity for Network and Information Security
2026
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
2025