Secure Multi-Party Non-Repudiation Protocols and Applications Secure Multi-Party Non-Repudiation Protocols and Applications
Advances in Information Security

Secure Multi-Party Non-Repudiation Protocols and Applications

    • ‏119٫99 US$
    • ‏119٫99 US$

وصف الناشر

Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement.


This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications.This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications.


Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography.This book is also suitable as an advanced-level text or reference book for students in computer science.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠٠٨
٣١ أكتوبر
اللغة
EN
الإنجليزية
عدد الصفحات
٢٠٨
الناشر
Springer US
البائع
Springer Nature B.V.
الحجم
١٫٨
‫م.ب.‬
Security and Privacy in Mobile Information and Communication Systems Security and Privacy in Mobile Information and Communication Systems
٢٠٠٩
Principles of Protocol Design Principles of Protocol Design
٢٠٠٨
Blockchain Technology and Application Blockchain Technology and Application
٢٠٢٠
Accountability and Privacy in Network Security Accountability and Privacy in Network Security
٢٠٢٠
Trusted Computing - Challenges and Applications Trusted Computing - Challenges and Applications
٢٠٠٨
Security in Fixed and Wireless Networks Security in Fixed and Wireless Networks
٢٠١٦
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
٢٠٠٩
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
٢٠١٦
Security for Telecommunications Networks Security for Telecommunications Networks
٢٠٠٨
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
٢٠٠٧
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
٢٠١٥
Network Security Policies and Procedures Network Security Policies and Procedures
٢٠٠٧