000 03321nam a22005415i 4500
001 978-0-387-75630-1
003 DE-He213
005 20250710084022.0
007 cr nn 008mamaa
008 110402s2009 xxu| s |||| 0|eng d
020 _a9780387756301
_a99780387756301
024 7 _a10.1007/978-0-387-75630-1
_2doi
100 1 _aOnieva, José A.
_eauthor.
245 1 0 _aSecure Multi-Party Non-Repudiation Protocols and Applications
_h[recurso electrónico] /
_cby José A. Onieva, Javier Lopez, Jianying Zhou.
264 1 _aBoston, MA :
_bSpringer US,
_c2009.
300 _aXVIII, 190p. 20 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x1568-2633 ;
_v43
505 0 _aand Fundamentals -- Fundamentals of Non-repudiation -- Multi-Party Non-repudiation -- Multi-Party Non-repudiation: Analysis -- New Design Approaches for MPNR -- Applications -- Multi-Party Non-repudiation Applications -- Scenarios Supported by MPNR Services -- Conclusions -- Conclusions.
520 _aResearch oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement. This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications.This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography.This book is also suitable as an advanced-level text or reference book for students in computer science.
650 0 _aCOMPUTER SCIENCE.
650 0 _aCOMPUTER NETWORK ARCHITECTURES.
650 0 _aCOMPUTER COMMUNICATION NETWORKS.
650 0 _aDATA PROTECTION.
650 0 _aDATA STRUCTURES (COMPUTER SCIENCE).
650 0 _aDATA ENCRYPTION (COMPUTER SCIENCE).
650 0 _aINFORMATION SYSTEMS.
650 1 4 _aCOMPUTER SCIENCE.
650 2 4 _aSYSTEMS AND DATA SECURITY.
650 2 4 _aCOMPUTER COMMUNICATION NETWORKS.
650 2 4 _aDATA ENCRYPTION.
650 2 4 _aINFORMATION SYSTEMS APPLICATIONS (INCL.INTERNET).
650 2 4 _aCOMPUTER SYSTEMS ORGANIZATION AND COMMUNICATION NETWORKS.
650 2 4 _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY.
700 1 _aLopez, Javier.
_eauthor.
700 1 _aZhou, Jianying.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387756295
830 0 _aAdvances in Information Security,
_x1568-2633 ;
_v43
856 4 0 _uhttp://dx.doi.org/10.1007/978-0-387-75630-1
_zVer el texto completo en las instalaciones del CICY
912 _aZDB-2-SCS
942 _2ddc
_cER
999 _c58711
_d58711