Search

Your search keyword '"nonrepudiation"' showing total 37 results

Search Constraints

Start Over You searched for: Descriptor "nonrepudiation" Remove constraint Descriptor: "nonrepudiation"
37 results on '"nonrepudiation"'

Search Results

1. A Hybrid Blockchain-Based Log Management Scheme With Nonrepudiation for Smart Grids.

3. A Secure and Lightweight Protocol for Message Authentication in Wireless Sensor Networks.

4. A Solution for Secure Multi-Party Certified Electronic Mail Using Blockchain

5. A Blockchain-Based Secure Inter-Hospital EMR Sharing System.

6. Symmetric-Key-Based Authentication among the Nodes in a Wireless Sensor and Actuator Network

7. A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT.

8. An Internet-of-Things-based Sensing Rural Medical Care System.

9. Proof of violation for response time auditing in cloud systems.

10. A Threshold Proxy Signature Scheme with Nonrepudiation and Anonymity

11. Fulfilling mutual nonrepudiation for cloud storage.

12. Security in Internet

13. Effective information management and assurance for a modern organisation during a crisis.

14. Measuring the Forensic-Ability of Audit Logs for Nonrepudiation.

15. SIPmsign: a lightweight mobile signature service based on the Session Initiation Protocol.

16. Secure proxy signature schemes from the Weil pairing.

17. A secure electronic cash based on a certificateless group signcryption scheme.

18. A Conditional Access System with Efficient Key Distribution and Revocation for Mobile Pay-TV Systems.

19. A Strong Designated Verifiable DL Based Signcryption Scheme.

20. Choosing a Biometric for Nonrepudiation.

21. Survey on Nonrepudiation: Digital Signature Versus Biometrics.

22. Multiparty Nonrepudiation: A Survey.

23. A Case (Study) For Usability in Secure Email Communication.

24. Accountability Protocols: Formalized and Verified.

25. Secure Internet banking authentication.

26. Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability

27. New Approaches to Digital Evidence.

28. All sail, no anchor II: Acceptable high-end PKI.

29. Improvement of threshold proxy signature scheme

30. Symmetric-Key-Based Authentication among the Nodes in a Wireless Sensor and Actuator Network.

31. A Blockchain-Based Secure Inter-Hospital EMR Sharing System

32. Trust aggregation authentication protocol using machine learning for IoT wireless sensor networks.

34. Cloud computing security requirements: a systematic review

35. QoS Issues of Using Probabilistic Non-Repudiation Protocol in Mobile Ad Hoc Network Environment

36. Information Security

37. Approach for Business Case Analysis of Using PKI on Smart Cards for Governmentwide Applications

Catalog

Books, media, physical & digital resources