Non-Repudiation
Continuous certification of non-repudiation in cloud storage services
9
Approaching decentralized non-repudiation
7
Recovering Evidentiary E mail for Non Repudiation Forensics
7
ch03 Non repudiation
44
Refining Bogus Data in Wireless Sensor Network Using Non Repudiation and Enrouting Filter Mechanism
6
Introducing a Domain Ontology based on the Role of Trusted Third Party (TTP) in inter Organizational Collaboration
5
b.i. Bulletin Informatique, 30 Juin 2000, edition speciale = Information Bulletin, Best practices in e-administration. 30 June 2000, Special Edition
96
Vol 9, No 5 (2019)
5
Study of Signcryption and ECC scheme
8
Network Security
5
An Electronic Public Engineering Project Bidding Protocol via a Subliminal Channel
14
Security of the Distributed Vehicular Broadcast Protocol DV CAST
6
How can M-Commerce be safe and secure? Empirical Analysis of M-Commerce Security Factors
5
Survey on Secure Live VM Migration in Cloud Computing by maintaining Integrity and Confidentiality
5
Security Analysis of Digital Signature Scheme with Message Recovery using Self-Certified Public Keys
13
Analysis of Various Attacks and Prevention of Dos Attack in P2PSIP Networks
8
Secure Embedded System Networking: An Advanced Security Perspective
9
A Review on Web Services and Security Issues
7
A MODIFIED APPROACH ON IDENTITY BASED CRYPTOGRAPHY AND DIGITAL SIGNATURE IN MANET
9
Security Issues and Its Mechanisms in Cloud Computing: A Review
7