Keyword : non-repudiation


An Improved Authenticated Encryption Scheme
Fagen LI Jiang DENG Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11 ; pp. 2171-2172
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
authenticated encryptionunforgeabilityconfidentialitynon-repudiation
 Summary | Full Text:PDF(54.6KB)

Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes
Mohamed RASSLAN Amr YOUSSEF 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5 ; pp. 1301-1302
Type of Manuscript:  LETTER
Category: Data Engineering, Web Information Systems
Keyword: 
authenticated encryptionauthenticitynon-repudiation
 Summary | Full Text:PDF(54.8KB)

A Formal Treatment of Non-repudiation Protocols
Satoshi HADA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/02/01
Vol. E87-A  No. 2 ; pp. 461-470
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
non-repudiationdigital signaturesconcurrent compositionuniversal composition
 Summary | Full Text:PDF(187.1KB)

Reducing Certificate Revocation and Non-repudiation Service in Public Key Infrastructure
Yoshiki SAMESHIMA Toshiyuki TSUTSUMI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/07/25
Vol. E83-A  No. 7 ; pp. 1441-1449
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
X. 509 authentication frameworkpublic key certificatecertificate revocation listnon-repudiationtime stamp
 Summary | Full Text:PDF(322.5KB)