메뉴 건너뛰기




Volumn 3348, Issue , 2004, Pages 48-60

On the security of a certified e-mail scheme

Author keywords

Certified e mail; Fair exchange; Non repudiation

Indexed keywords

CERTIFIED EMAIL; E-MAIL PROTOCOL; E-MAIL SYSTEMS; FAIR EXCHANGE; MODIFIED SCHEME; NON REPUDIATION; OPTIMISTICS; SECURITY FLAWS; TRUSTED THIRD PARTIES; VALUE ADDED SERVICE; CERTIFIED E-MAIL;

EID: 35048867952     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30556-9_5     Document Type: Article
Times cited : (9)

References (20)
  • 5
    • 84944878387 scopus 로고    scopus 로고
    • Stateless-receipient certified E-mail system based on verifiable encryption
    • CT-RSA '02, Springer-Verlag
    • G. Ateniese and C. Nita-Rotaru. Stateless-receipient certified E-mail system based on verifiable encryption. In: CT-RSA '02, LNCS 2271, pp. 182-199. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2271 , pp. 182-199
    • Ateniese, G.1    Nita-Rotaru, C.2
  • 6
    • 35048881612 scopus 로고    scopus 로고
    • Analysis and improvement of Micali's fair contract signing protocol
    • Information Security and Privacy (ACISP'04), Springer-Verlag
    • F. Bao, G. Wang, J. Zhou, and H. Zhu. Analysis and improvement of Micali's fair contract signing protocol. In: Information Security and Privacy (ACISP'04), LNCS 3108, pp. 176-187. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3108 , pp. 176-187
    • Bao, F.1    Wang, G.2    Zhou, J.3    Zhu, H.4
  • 8
    • 84856533229 scopus 로고    scopus 로고
    • Exploring fair exchange protocols using specification animation
    • Information Security Workshop (ISWOO ), Springer-Verlag
    • C. Boyd and P. Kearney. Exploring fair exchange protocols using specification animation. In: Information Security Workshop (ISWOO ), LNCS 1975, pp. 209223. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1975 , pp. 209223
    • Boyd, C.1    Kearney, P.2
  • 9
    • 0029362450 scopus 로고
    • Practical and provably secure release of a secret and exchange of signatures
    • I.B. Damgård. Practical and provably secure release of a secret and exchange of signatures. Journal of Cryptology,8(4): 201-222, 1995.
    • (1995) Journal of Cryptology , vol.8 , Issue.4 , pp. 201-222
    • Damgård, I.B.1
  • 11
    • 27644557237 scopus 로고    scopus 로고
    • An efficient protocol for certified elctronic mail
    • Information Security Workshop (ISW'OO ), Springer-Verlag
    • J. L. Ferrer-Gomila, M. Payeras-Capella, and L. Huguet-Rotger. An efficient protocol for certified elctronic mail. In: Information Security Workshop (ISW'OO ), LNCS 1975, pp. 237-248. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1975 , pp. 237-248
    • Ferrer-Gomila, J.L.1    Payeras-Capella, M.2    Huguet-Rotger, L.3
  • 12
    • 84974711047 scopus 로고    scopus 로고
    • A cerified e-mail system with reciever's selctive usage of delivery authortiy
    • Indocrypt 2002, Springer-Verlag
    • K. Imamoto and K. Sakurai. A cerified e-mail system with reciever's selctive usage of delivery authortiy. In: Indocrypt 2002, LNCS 2551, pp. 326-338. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2551 , pp. 326-338
    • Imamoto, K.1    Sakurai, K.2
  • 13
    • 84974678532 scopus 로고    scopus 로고
    • Selective receipt in cerified e-mail
    • Indocrypt 2001, Springer-Verlag
    • S. Kremer and O. Markowitch. Selective receipt in cerified e-mail. In: Indocrypt 2001, LNCS 2247, pp. 136-148. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2247 , pp. 136-148
    • Kremer, S.1    Markowitch, O.2
  • 14
    • 0036836682 scopus 로고    scopus 로고
    • An intensive survey of fair non-repudiation protocols
    • Eisevier, Nov.
    • S. Kremer, O. Markowitch, and J. Zhou. An intensive survey of fair non-repudiation protocols. Computer Communications, 25(17): 1606-1621. Eisevier, Nov. 2002.
    • (2002) Computer Communications , vol.25 , Issue.17 , pp. 1606-1621
    • Kremer, S.1    Markowitch, O.2    Zhou, J.3
  • 15
    • 35248837018 scopus 로고    scopus 로고
    • On the security of fair non-repudiation protocols
    • Information Security Conference (ISC'03), Springer-Verlag
    • S. Gurgens, C. Rudolph, and H. Vogt. On the security of fair non-repudiation protocols. In: Information Security Conference (ISC'03), LNCS 2851, pp. 193-207. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2851 , pp. 193-207
    • Gurgens, S.1    Rudolph, C.2    Vogt, H.3
  • 16
    • 84945247102 scopus 로고    scopus 로고
    • An attack on a protocol for certified delivery
    • Information Security Conference (ISC'02 ), SpringerVerlag
    • J.R.M. Monteiro and R. Dahab. An attack on a protocol for certified delivery. In: Information Security Conference (ISC'02 ), LNCS 2433, pp. 428-436. SpringerVerlag, 2002.
    • (2002) LNCS , vol.2433 , pp. 428-436
    • Monteiro, J.R.M.1    Dahab, R.2
  • 19
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb.
    • R.L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, Feb. 1978, 21(2): 120126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 20
    • 84949791102 scopus 로고    scopus 로고
    • Certified electronic mail
    • Computer Security - ESORICS'96, Springer-Verlag
    • J. Zhou and D. Gollmann. Certified electronic mail. In: Computer Security - ESORICS'96, LNCS 1146, pp. 160-171. Springer-Verlag, 1996.
    • (1996) LNCS , vol.1146 , pp. 160-171
    • Zhou, J.1    Gollmann, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.