Secure Multi-Party Non-Repudiation Protocols and Applications Secure Multi-Party Non-Repudiation Protocols and Applications
Advances in Information Security

Secure Multi-Party Non-Repudiation Protocols and Applications

    • €119.99
    • €119.99

Publisher Description

Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement.


This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications.This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications.


Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography.This book is also suitable as an advanced-level text or reference book for students in computer science.

GENRE
Computing & Internet
RELEASED
2008
31 October
LANGUAGE
EN
English
LENGTH
208
Pages
PUBLISHER
Springer US
PROVIDER INFO
Springer Science & Business Media LLC
SIZE
1.8
MB
Security and Privacy in Mobile Information and Communication Systems Security and Privacy in Mobile Information and Communication Systems
2009
Principles of Protocol Design Principles of Protocol Design
2008
Blockchain Technology and Application Blockchain Technology and Application
2020
Accountability and Privacy in Network Security Accountability and Privacy in Network Security
2020
Trusted Computing - Challenges and Applications Trusted Computing - Challenges and Applications
2008
Security in Fixed and Wireless Networks Security in Fixed and Wireless Networks
2016
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
2025
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
2024
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024
Decision Making and Security Risk Management for IoT Environments Decision Making and Security Risk Management for IoT Environments
2024
Security and Risk Analysis for Intelligent Edge Computing Security and Risk Analysis for Intelligent Edge Computing
2023