The original publication is available at www.springerlink.comPhan, R. C.R.C.-W. Phan, "Non-repudiable authentication and billing architecture for wireless mesh networks," Wireless Networks, vol. 17, no. 4, pp. 1055-1061, May, 2011. Article (CrossRef Link)...
A Non-Repudiable Bitstring Commitment Scheme Based on a Public-Key Cryptosystem Jordi Castell` a-Roca and Josep Domingo-Ferrer Universitat Rovira i Virgili Dept. of Computer Engineering and Mathematics Av. Pa¨ısos Catalans 26, E-43007 Tarragona, Catalonia E-mail {jcaste, jdomingo}@etse.ur...
We propose an instant messaging protocol that provides a secure communication channel, authenticates all participants, and produces a secure and non-repudiable log of the conversation. Our inspiration comes from Borisov, Goldberg, and Brewer, who created a secure but repudiable protocol with their ...
In 2004, Tzeng, Yang and Hwang proposed a non-repudiable threshold multi-proxy multi-signature scheme with shared verification. However, Bao, Cao and Wang pointed out that Tzeng et al.s scheme cannot resist frame attacks and therefore presented an improved version. In this paper, we will ...
Accountability and acknowledgment can be achieved by the systematic maintenance of an irrefutable audit trail to render the interaction non-repudiable. To safeguard the interests of each party, the mechanisms used to meet this requirement should ensure fairness. That is, misbehaviour should not ...
1) Non repudiable 防否认2) deny (a charge) 否认,否定 3) To declare false;deny. 否定,否认 4) deny [英][dɪ'naɪ] [美][dɪ'naɪ] 否认 1. The attackers can deny that they had take part in process of signing some message with others . 通过分析研究基于Meta-E1 Gamal...
Non-RepudiationMobile IdentityMinimal IdentityNon-Repudiable Minimal Mobile Identity ModelNRMIDue to the personal nature of a mobile device, it is seen as a suitable medium for storing personal information and credentials. As a result, the mobile device becomes the owner's identity-on-the-move. ...
Raphael C.-W. PhanWireless NetworksR.C.-W. Phan, "Non-repudiable authentication and billing architecture for wireless mesh networks," Wireless Networks, vol. 17, no. 4, pp. 1055-1061, May, 2011. Article (CrossRef Link)
A non-repudiable transaction protocol system includes a memory, at least one processor in communication with the memory, an operating system executing on the at least one processor, a resource manager configured to manage a storage system, and a transaction manager. The transaction manager is ...
In this paper, we propose two implementations for two types of authentication: 1) non-repudiable authentication in a scientiffic computing environment: computing the complex zeros of the Riemann 3 -function or verifying the Goldbach's conjecture, and 2) repudiable authentications in an e-voting ...