The date of receipt and acceptance will be inserted by the editor Abstract We analyzed two non-repudiation protocols and found some new attacks on the fairness and termination property of these protocols. Our attacks are enabled by several inherent design weaknesses, which also apply to other non-repudiation protocols. To prevent these attacks, we propose generic countermeasures that considerably strengthen the design and implementation of non-repudiation protocols. The application of these countermeasures is finally shown by our construction of a new fair non-repudiation protocol. Key words Security protocols, fair non-repudiation, protocol design, protocol analysis
International audienceNon-repudiation protocols have an important role in many areas where secured t...
While security issues such as secrecy and authentication have been studied intensively, most interes...
Abstract. In this paper we consider the optimistic approach of the non-repudiation protocols. We stu...
A fair non-repudiation protocol should not give the sender of a message an advantage over the receiv...
Abstract:- The increasing usage of internet-based services, such as certified e-mails, electronic pa...
We design and analyze a simple optimistic fair non-repudiation protocol. Our protocol is considerabl...
We design and analyze a simple optimistic fair non-repudiation protocol. Our protocol is considerabl...
Abstract. Non-repudiation protocols have an important role in many areas where secured transactions ...
Abstract. An approach to protocol analysis using asynchronous product automata (APA) and the simple ...
We design and model-check a simple optimistic fair non-repudiation protocol. Our protocol is conside...
The date of receipt and acceptance will be inserted by the editor Abstract In this paper we introduc...
An approach to protocol analysis using asynchronous product automata (APA) and the simple homomorphi...
An approach to protocol analysis using asynchronous product automata (APA) and the simple homomorphi...
. This paper discusses non-repudiation services regarding the transfer of a message and classifies t...
Non-repudiation protocols must ensure that when two parties exchange informations over a network, ne...
International audienceNon-repudiation protocols have an important role in many areas where secured t...
While security issues such as secrecy and authentication have been studied intensively, most interes...
Abstract. In this paper we consider the optimistic approach of the non-repudiation protocols. We stu...
A fair non-repudiation protocol should not give the sender of a message an advantage over the receiv...
Abstract:- The increasing usage of internet-based services, such as certified e-mails, electronic pa...
We design and analyze a simple optimistic fair non-repudiation protocol. Our protocol is considerabl...
We design and analyze a simple optimistic fair non-repudiation protocol. Our protocol is considerabl...
Abstract. Non-repudiation protocols have an important role in many areas where secured transactions ...
Abstract. An approach to protocol analysis using asynchronous product automata (APA) and the simple ...
We design and model-check a simple optimistic fair non-repudiation protocol. Our protocol is conside...
The date of receipt and acceptance will be inserted by the editor Abstract In this paper we introduc...
An approach to protocol analysis using asynchronous product automata (APA) and the simple homomorphi...
An approach to protocol analysis using asynchronous product automata (APA) and the simple homomorphi...
. This paper discusses non-repudiation services regarding the transfer of a message and classifies t...
Non-repudiation protocols must ensure that when two parties exchange informations over a network, ne...
International audienceNon-repudiation protocols have an important role in many areas where secured t...
While security issues such as secrecy and authentication have been studied intensively, most interes...
Abstract. In this paper we consider the optimistic approach of the non-repudiation protocols. We stu...