Search dblp for Publications

export results for "Formal Analysis of a Non-Repudiation Protocol."

 download as .bib file

@article{DBLP:journals/jksucis/YangXZZ23,
  author       = {Ke Yang and
                  Meihua Xiao and
                  Xiaomei Zhong and
                  Yingqiang Zhong},
  title        = {A novel formal logic for formal analysis of timeliness in non-repudiation
                  protocols},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {35},
  number       = {8},
  pages        = {101664},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jksuci.2023.101664},
  doi          = {10.1016/J.JKSUCI.2023.101664},
  timestamp    = {Fri, 05 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/YangXZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/AlcaideEIS05,
  author       = {Almudena Alcaide and
                  Juan M. Est{\'{e}}vez{-}Tapiador and
                  Antonio Izquierdo and
                  Jos{\'{e}} Mar{\'{\i}}a Sierra},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Antonio Lagan{\`{a}} and
                  Heow Pueh Lee and
                  Youngsong Mun and
                  David Taniar and
                  Chih Jeng Kenneth Tan},
  title        = {A Formal Analysis of Fairness and Non-repudiation in the {RSA-CEGD}
                  Protocol},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2005, International
                  Conference, Singapore, May 9-12, 2005, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3483},
  pages        = {1309--1318},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11424925\_136},
  doi          = {10.1007/11424925\_136},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/AlcaideEIS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Schneider98,
  author       = {Steve A. Schneider},
  title        = {Formal Analysis of a Non-Repudiation Protocol},
  booktitle    = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop,
                  Rockport, Massachusetts, USA, June 9-11, 1998},
  pages        = {54--65},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CSFW.1998.683155},
  doi          = {10.1109/CSFW.1998.683155},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Schneider98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics