Secure Multi-Party Non-Repudiation Protocols and Applications Secure Multi-Party Non-Repudiation Protocols and Applications
Advances in Information Security

Secure Multi-Party Non-Repudiation Protocols and Applications

    • $119.99
    • $119.99

Publisher Description

Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement.


This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications.This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications.


Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography.This book is also suitable as an advanced-level text or reference book for students in computer science.

GENRE
Computers & Internet
RELEASED
2008
October 31
LANGUAGE
EN
English
LENGTH
208
Pages
PUBLISHER
Springer US
SELLER
Springer Nature B.V.
SIZE
1.8
MB
Security and Privacy in Mobile Information and Communication Systems Security and Privacy in Mobile Information and Communication Systems
2009
Principles of Protocol Design Principles of Protocol Design
2008
Blockchain Technology and Application Blockchain Technology and Application
2020
Accountability and Privacy in Network Security Accountability and Privacy in Network Security
2020
Trusted Computing - Challenges and Applications Trusted Computing - Challenges and Applications
2008
Security in Fixed and Wireless Networks Security in Fixed and Wireless Networks
2016
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007