咨询与建议

限定检索结果

文献类型

  • 9 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 13 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 7 篇 计算机科学与技术...
    • 3 篇 网络空间安全
    • 2 篇 电气工程
    • 2 篇 软件工程
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
  • 2 篇 理学
    • 2 篇 数学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 13 篇 non-repudiation
  • 2 篇 integrity
  • 2 篇 confidentiality
  • 2 篇 digital signatur...
  • 2 篇 privacy
  • 1 篇 service
  • 1 篇 authentication f...
  • 1 篇 ikev2
  • 1 篇 architecture
  • 1 篇 prism
  • 1 篇 object
  • 1 篇 intranet
  • 1 篇 resilience
  • 1 篇 svo logic
  • 1 篇 active identity ...
  • 1 篇 internet
  • 1 篇 fair exchange
  • 1 篇 electronic busin...
  • 1 篇 electronic
  • 1 篇 ant colony optim...

机构

  • 1 篇 department of in...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of el...
  • 1 篇 department of co...
  • 1 篇 department of el...
  • 1 篇 department of me...
  • 1 篇 schoolofcomputer...
  • 1 篇 college of compu...
  • 1 篇 西安电子科技大学
  • 1 篇 college of mathe...
  • 1 篇 key laboratory o...
  • 1 篇 college of compu...
  • 1 篇 state key labora...
  • 1 篇 state key labora...

作者

  • 1 篇 li ji-guo. zhang...
  • 1 篇 xiao guozhen
  • 1 篇 mohd faizan
  • 1 篇 areej alasiry
  • 1 篇 杨超
  • 1 篇 wang yumin
  • 1 篇 怀进鹏
  • 1 篇 蒋晓宁
  • 1 篇 dhirendra pandey
  • 1 篇 si guangdong
  • 1 篇 xingchao an
  • 1 篇 guizhou universi...
  • 1 篇 nannan wang
  • 1 篇 曹春杰
  • 1 篇 wilson mungwena
  • 1 篇 cosmas rashama
  • 1 篇 zhiyi fang
  • 1 篇 mohd waris khan
  • 1 篇 叶澄清
  • 1 篇 guo xiaoli

语言

  • 10 篇 英文
  • 3 篇 中文
检索条件"主题词=non-repudiation"
13 条 记 录,以下是1-10 订阅
排序:
Fairness analysis of extra-gain guilty of a non-repudiation protocol
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2022年 第6期23卷 893-908页
作者: Xu GUO Department of Electronics and Information Shanghai Dianji UniversityShanghai 201306China
Many traditional applications can be refined thanks to the development of blockchain technology. One of these services is non-repudiation, in which participants in a communication process cannot deny their involvement... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Efficient nonrepudiation Multicast Source Authentication Schemes
收藏 引用
Journal of Computer Science & Technology 2002年 第6期17卷 820-829页
作者: 李先贤 怀进鹏 SchoolofComputer BeijingUniversityofAeronauticsandAstronauticsBeijing100083P.R.China
In secure multicast communication, packet source authentication is a bot-tleneck problem due to the dynamic property of the multicast group, unreliability of datatransmission and the large number of data packets. This... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Signature Scheme with non-repudiation
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第5期11卷 1249-1252页
作者: XIN Xiangjun GUO Xiaoli XIAO Guozhen State Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 Shaanxi China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou 450002Henan China
Based on the Schnorr signature scheme, a new signature scheme with non-repudiation is proposed. In this scheme, only the signer and the designated receiver can verify the signature signed by the signer, and if necessa... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
EAR Protocol-Towards Fair Optimistic non-repudiation Exchange
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2005年 第2期12卷 59-63页
作者: WANG Hai-yan WANG Ru-chuan Department of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 P.R. China State Key Laboratory of Information Security Beijing 100039 P.R. China
Fairness is of crucial importance for the exchange protocols via Internet . non-repudiation therefore becomes one of the vital premises, which are essential in the exchange of sensitive and important messages. This pa... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Pay-TV System with Strong Privacy and non-repudiation Protection
A Pay-TV System with Strong Privacy and Non-Repudiation Prot...
收藏 引用
2006北京地区高校研究生学术交流会
作者: Zhang Yichun, Yang Cheng, Li Jianzeng (Communication University of China, Beijing 100024)
Ronggong.Song proposed a set of protocols for Pay-TV systems in order to secure the subscribers’ privacy in 2003. In his paper, he developed a new conditional access system (CAS ) mechanism -"e-ticket"- for Pay-TV sy... 详细信息
来源: cnki会议 评论
A MUTUAL non-repudiation PROTOCOL WITH PRIVACY
收藏 引用
Journal of Zhejiang University-Science A(Applied Physics & Engineering) 2000年 第3期 80-84页
作者: 蒋晓宁 叶澄清
non repudiation services provide the parties involved in a transaction with protection against the other party by denying that a particular event or action took place. They collect irrefutable evidence to support the ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Security Test Case Prioritization through Ant Colony Optimization Algorithm
收藏 引用
Computer Systems Science & Engineering 2023年 第12期47卷 3165-3195页
作者: Abdulaziz Attaallah Khalil al-Sulbi Areej Alasiry Mehrez Marzougui Mohd Waris Khan Mohd Faizan Alka Agrawal Dhirendra Pandey Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Al-Qunfudah Computer CollegeUmm Al-Qura UniversityMeccaSaudi Arabia College of Computer Science King Khalid UniversityAbha61421Saudi Arabia Department of Computer Application Integral UniversityLucknowUttar Pradesh226026India Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknowUttar Pradesh226025India
Security testing is a critical concern for organizations worldwide due to the potential financial setbacks and damage to reputation caused by insecure software systems.One of the challenges in software security testin... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A New Forward-Secure Authenticated Encryption Scheme with Message Linkages
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1537-1540页
作者: LI Yanping SI Guangdong WANG Yumin Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 Shaanxi China College of Mathematics and Information Science Shaanxi Normal University Xi'an 710062 Shaanxi China
Yoon and Yoo recently proposed a robust authenticated encryption scheme and claimed their scheme has the properties of forward secrecy and confidentiality. The current paper, however, points out that Yoon-Yoo's schem... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Electronic Commerce Technology Adoption at the Scientific and Industrial Research and Development Centre
收藏 引用
Advances in Internet of Things 2013年 第3期3卷 45-52页
作者: Cosmas Rashama Wilson Mungwena Tonderai Damba Department of Electrical Engineering University of Zimbabwe Harare Zimbabwe Department of Mechanical Engineering University of Zimbabwe Harare Zimbabwe
This paper focuses on the level of adoption of E-Commerce Technology at the Scientific and Industrial Research and Development Centre (SIRDC), a Zimbabwean organization established by an act of parliament, with a mand... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Solutions for 3 Security Problems and its Application in SOA-FCA Service Components Based SDO
收藏 引用
International Journal of Communications, Network and System Sciences 2010年 第10期3卷 811-815页
作者: Nannan Wang Zhiyi Fang Kaige Yan Yu Tang Xingchao An College of Computer Science and Technology Jilin University
Service-Oriented Architecture (SOA), which is an open architecture, provides developers with more freedom. However, its security problem goes from bad to worse. By taking an insurance business in Formal Concept Analys... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论