Secure Multi-Party Non-Repudiation Protocols and Applications Secure Multi-Party Non-Repudiation Protocols and Applications
Advances in Information Security

Secure Multi-Party Non-Repudiation Protocols and Applications

    • US$119.99
    • US$119.99

출판사 설명

Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement.


This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications.This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications.


Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography.This book is also suitable as an advanced-level text or reference book for students in computer science.

장르
컴퓨터 및 인터넷
출시일
2008년
10월 31일
언어
EN
영어
길이
208
페이지
출판사
Springer US
판매자
Springer Nature B.V.
크기
1.8
MB
Security and Privacy in Mobile Information and Communication Systems Security and Privacy in Mobile Information and Communication Systems
2009년
Principles of Protocol Design Principles of Protocol Design
2008년
Blockchain Technology and Application Blockchain Technology and Application
2020년
Accountability and Privacy in Network Security Accountability and Privacy in Network Security
2020년
Trusted Computing - Challenges and Applications Trusted Computing - Challenges and Applications
2008년
Security in Fixed and Wireless Networks Security in Fixed and Wireless Networks
2016년
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009년
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016년
Security for Telecommunications Networks Security for Telecommunications Networks
2008년
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007년
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015년
Network Security Policies and Procedures Network Security Policies and Procedures
2007년