메뉴 건너뛰기




Volumn 17, Issue , 2004, Pages 266-279

Formal analysis of multi-party contract signing

Author keywords

[No Author keywords available]

Indexed keywords

CONTRACT-SIGNING PROTOCOLS; FORMAL ANALYSIS; GAME SEMANTICS; TEMPORAL LOGIC;

EID: 4944247375     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (36)

References (16)
  • 5
    • 0025568003 scopus 로고
    • Value exchange systems enabling security and unobservability
    • H. Burk and A. Pfitzmann. Value exchange systems enabling security and unobservability. In Computers and Security, 9(8):715-721, 1990.
    • (1990) Computers and Security , vol.9 , Issue.8 , pp. 715-721
    • Burk, H.1    Pfitzmann, A.2
  • 10
    • 4243796648 scopus 로고
    • Relations among public key signature systems
    • Technion, Haifa, Israel, Mar.
    • S. Even and Y. Yacobi. Relations among public key signature systems. Technical Report 175, Technion, Haifa, Israel, Mar. 1980.
    • (1980) Technical Report , vol.175
    • Even, S.1    Yacobi, Y.2
  • 13
    • 35248888130 scopus 로고    scopus 로고
    • Security analysis of (un-) fair non-repudiation protocols
    • A. E. Abdallah, P. Ryan, and S. A. Schneider, editors, London, UK. Springer-Verlag
    • S. Gürgens and C. Rudolph. Security analysis of (un-) fair non-repudiation protocols. In A. E. Abdallah, P. Ryan, and S. A. Schneider, editors, Formal Aspects of Security, volume 2629 of Lecture Notes in Computer Science, pages 97-114, London, UK, 2003. Springer-Verlag.
    • (2003) Formal Aspects of Security, Volume 2629 of Lecture Notes in Computer Science , vol.2629 , pp. 97-114
    • Gürgens, S.1    Rudolph, C.2
  • 15
    • 84948779843 scopus 로고    scopus 로고
    • Game analysis of abuse-free contract signing
    • Cape Breton, Canada, June. IEEE Computer Society Press
    • S. Kremer and J.-F. Raskin. Game analysis of abuse-free contract signing. In 15th IEEE Computer Security Foundations Workshop, Cape Breton, Canada, June 2002. IEEE Computer Society Press.
    • (2002) 15th IEEE Computer Security Foundations Workshop
    • Kremer, S.1    Raskin, J.-F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.