• No results found

Non-Repudiation

Continuous certification of non-repudiation in cloud storage services

Continuous certification of non-repudiation in cloud storage services

... In this paper we present an approach for certifying the implementation of a NR protocol mechanism that is based on the fair multi-party non-repudiation (MPNR) scheme proposed in [4]. Our certification ...

9

Approaching decentralized non-repudiation

Approaching decentralized non-repudiation

... for Non- repudiation and Authentication in addition to Confidentiality, Integrity and Availability, and which can readily be implemented in decentralized networks, as well as overlaid on existing ...

7

Recovering Evidentiary E mail for Non Repudiation Forensics

Recovering Evidentiary E mail for Non Repudiation Forensics

... of non-repudiation and computing forensic of such security issue with legal effect, a digital record is required to be maintained which can provide the accessory data to detect and obtain ...

7

ch03 Non repudiation

ch03 Non repudiation

...  If a law requires a record to be in writing, an electronic record satisfies the law."  A contract may not be denied legal effect or enforceability solely because an. electronic re[r] ...

44

Refining Bogus Data in Wireless Sensor Network Using Non Repudiation and Enrouting Filter Mechanism

Refining Bogus Data in Wireless Sensor Network Using Non Repudiation and Enrouting Filter Mechanism

... CNR consist of three components that work in concert to detect and filter out forged messages: 1 each legitimate report carries multiple MACs generated by different nodes that detect the[r] ...

6

Introducing a Domain Ontology based on the Role of Trusted Third Party (TTP) in inter Organizational Collaboration

Introducing a Domain Ontology based on the Role of Trusted Third Party (TTP) in inter Organizational Collaboration

... The project aims to provide ontology for modeling collaboration space concepts based on a TTP in the interoperability of enterprises. To collaboration space between enterprises has established, the public processes, ...

5

b.i. Bulletin Informatique, 30 Juin 2000, edition speciale = Information Bulletin, Best practices in e-administration. 30 June 2000, Special Edition

b.i. Bulletin Informatique, 30 Juin 2000, edition speciale = Information Bulletin, Best practices in e-administration. 30 June 2000, Special Edition

... To allow for access to the public, using ACES certificates of corner stone of the Access America programme, to provide authentication, access control, data integrity, and non-repudiation[r] ...

96

Vol 9, No 5 (2019)

Vol 9, No 5 (2019)

... authorization, non- repudiation provides the accountability service, that is a receiver cannot deny having received the data nor can the other party denies having sent a ...

5

Study of Signcryption and ECC scheme

Study of Signcryption and ECC scheme

... Whitfield Diffie and Martin Hellman was first introduced the concept of public key cryptography (PKC) in 1976. Two types of Keys used by public key cryptography: public and secret key. Public key used for encryption at ...

8

Network Security

Network Security

... Non‐repudiation – Ensure the user does not refute that he used the network With the understanding of security issues, potential attackers, needed level of security, and factors that make[r] ...

5

An Electronic Public Engineering Project Bidding Protocol via a Subliminal Channel

An Electronic Public Engineering Project Bidding Protocol via a Subliminal Channel

... of non-repudiation, untraceabil- ity, auditablity, one-time registration and unlinkabil- ...unforgeability, non-repudiation, fair- ness, public verifiability, unlinkability among various ...

14

Security of the Distributed Vehicular Broadcast Protocol DV CAST

Security of the Distributed Vehicular Broadcast Protocol DV CAST

... Safety applications are one of the most important applications of Vehicular Ad hoc Networks (VANETs), where safety messages are required to be disseminated in a timely manner to all vehicles within a region of interest. ...

6

How can M-Commerce be safe and secure? Empirical Analysis of M-Commerce Security Factors

How can M-Commerce be safe and secure? Empirical Analysis of M-Commerce Security Factors

... Table No. 1 shows the mean value depicting the overall importance of “M-Commerce S&S”. As far as this descriptive statistics is concerned, M-S&S is above satisfactory level (with a mean value of 3.91 on a 5 point ...

5

Survey on Secure Live VM Migration in Cloud Computing by maintaining Integrity and Confidentiality

Survey on Secure Live VM Migration in Cloud Computing by maintaining Integrity and Confidentiality

... But it is quite challenging task to migrate data and it involves various major security issues as well like seven security threats like Access Control, Authentication, Non Repudiation,[r] ...

5

Security Analysis of Digital Signature Scheme with Message Recovery using Self-Certified Public Keys

Security Analysis of Digital Signature Scheme with Message Recovery using Self-Certified Public Keys

... Digital signature plays a key role in modern cryptographic communications. It not only provides authenticity and integrity, but also digital signature brings non-repudiation with it. Like ElGamal digital ...

13

Analysis of Various Attacks and Prevention of Dos Attack in P2PSIP Networks

Analysis of Various Attacks and Prevention of Dos Attack in P2PSIP Networks

... and non-repudiation is affected by the possible attacks Thus we see that only in DoS attack all the five security parameters are hampered and hence we are in a position to analyze that the DOS attack is the ...

8

Secure Embedded System Networking: An Advanced Security Perspective

Secure Embedded System Networking: An Advanced Security Perspective

... and non-repudiation, while availability is made possible through the use of access control security mechanisms The level of security provided is dependent upon many things such as the cryptographic methods ...

9

A Review on Web Services and Security Issues

A Review on Web Services and Security Issues

... 1. XML digital signature - XML digital signature provides authentication, data integrity and non-repudiation. It is to develop XML syntax for representing digital signatures over any data type. The XML ...

7

A MODIFIED APPROACH ON IDENTITY BASED CRYPTOGRAPHY AND DIGITAL SIGNATURE IN MANET

A MODIFIED APPROACH ON IDENTITY BASED CRYPTOGRAPHY AND DIGITAL SIGNATURE IN MANET

... In the early research many problem are come across the path of Security proposals that the attack can be done easily. As we are entered into the modern world there are many techniques that are used to protect the private ...

9

Security Issues and Its Mechanisms in Cloud Computing: A Review

Security Issues and Its Mechanisms in Cloud Computing: A Review

... i). Encryption:-Data in readable format when transmitted over network is vulnerable to unauthorized person. Encryption is a mechanism which is used for confidentiality and integrity of data. It is used for encoding ...

7

Show all 10000 documents...

Related subjects