Details
Secure Multi-Party Non-Repudiation Protocols and Applications
Advances in Information Security, Band 43
96,29 € |
|
Verlag: | Springer |
Format: | |
Veröffentl.: | 31.10.2008 |
ISBN/EAN: | 9780387756301 |
Sprache: | englisch |
Anzahl Seiten: | 190 |
Dieses eBook enthält ein Wasserzeichen.
Beschreibungen
<p>Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement. </p>
<p>This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications.</p>
<p>Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. This book is also suitable as an advanced-level text or reference book for students incomputer science.</p>
<p>This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications.</p>
<p>Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. This book is also suitable as an advanced-level text or reference book for students incomputer science.</p>
and Fundamentals.- Fundamentals of Non-repudiation.- Multi-Party Non-repudiation.- Multi-Party Non-repudiation: Analysis.- New Design Approaches for MPNR.- Applications.- Multi-Party Non-repudiation Applications.- Scenarios Supported by MPNR Services.- Conclusions.- Conclusions.
<p>Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. <strong>Secure Multi-Party Non-Repudiation Protocols and Applications</strong> supports this statement.</p>
<p></p>
<p>This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications.This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications.</p>
<p></p>
<p><strong>Secure Multi-Party Non-Repudiation Protocols and Applications</strong> is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography.This book is also suitable as an advanced-level text or reference book for students in computer science.</p>
<p></p>
<p></p>
<p>This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications.This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications.</p>
<p></p>
<p><strong>Secure Multi-Party Non-Repudiation Protocols and Applications</strong> is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography.This book is also suitable as an advanced-level text or reference book for students in computer science.</p>
<p></p>
Security professionals will find this book very useful in the design of secure applications with multiple entities, helping them to envisage the basics of multi-party non-repudiation Useful as an advanced level textbook for students or researchers who wish to understand the non-repudiation service and mechanisms in the presence of an undefined number of players
<p>Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. This book supports this statement. The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level text or reference book for students in computer science.</p>
Diese Produkte könnten Sie auch interessieren:
Genomics at the Nexus of AI, Computer Vision, and Machine Learning
von: Shilpa Choudhary, Sandeep Kumar, Swathi Gowroju, Monali Gulhane, R. Sri Lakshmi
216,99 €