메뉴 건너뛰기




Volumn 15, Issue 3, 2009, Pages 555-583

A new fair non-repudiation protocol for secure negotiation and contract signing

Author keywords

Confidentiality; Contract signing protocol; Fair exchange; Intellectual Property Rights contracts; Secure negotiation

Indexed keywords


EID: 67449108412     PISSN: 0958695X     EISSN: 09486968     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (5)

References (48)
  • 1
    • 84867467187 scopus 로고    scopus 로고
    • a Ed). 2005
    • a Ed). 2005.
  • 2
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • January
    • M. Abadi, R. Needham, Prudent engineering practice for cryptographic protocols, IEEE Transactions on Software Engineering, 22(1):6-15, January 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 3
    • 33645689192 scopus 로고    scopus 로고
    • Certified email with a light on-line trusted third party: Design and implementation
    • The Eleventh International World Wide Web Conference, Honoloulu, Hawaii, USA
    • M. Abadi, N. Glew, B. Horne, B. Pinkas, Certified email with a light on-line trusted third party: design and implementation, The Eleventh International World Wide Web Conference, Honoloulu, Hawaii, USA, 2002.
    • (2002)
    • Abadi, M.1    Glew, N.2    Horne, B.3    Pinkas, B.4
  • 4
    • 3543145461 scopus 로고    scopus 로고
    • An Extended Multi-Agent Negotiation Protocol
    • Springer Science+Business Media B.V., Formerly Kluwer Academic Publishers B.V
    • S. Aknine, S. Pinson, M. F. Shakun, An Extended Multi-Agent Negotiation Protocol, Journal of Autonomous Agents and Multi-Agent Systems, 8, 5-45, Springer Science+Business Media B.V., Formerly Kluwer Academic Publishers B.V. 2004.
    • (2004) Journal of Autonomous Agents and Multi-Agent Systems , vol.8 , pp. 5-45
    • Aknine, S.1    Pinson, S.2    Shakun, M.F.3
  • 5
    • 30044452647 scopus 로고    scopus 로고
    • Dynamic and Secure B2B E-contract Update Management
    • Proceedings of the 6th ACM Conference on Electronic Commerce (EC'05), Vancouver, Canada
    • S. Angelov, S. Till, P. Grefen, Dynamic and Secure B2B E-contract Update Management, Proceedings of the 6th ACM Conference on Electronic Commerce (EC'05), Vancouver, Canada. 2005.
    • (2005)
    • Angelov, S.1    Till, S.2    Grefen, P.3
  • 6
    • 0031650188 scopus 로고    scopus 로고
    • Asynchronous protocols for optimistic fair exchange
    • Proceedings of the IEEE Symposium on Research in Security and Privacy
    • N. Asokan, V. Shoup, M. Waidner, Asynchronous protocols for optimistic fair exchange, Proceedings of the IEEE Symposium on Research in Security and Privacy, 1998.
    • (1998)
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 7
    • 35248876774 scopus 로고    scopus 로고
    • SAT-based Model-Checking of Security Protocols using Planning Graph Analysis
    • In Proc. of the 12th International Symposium of Formal Methods Europe (FME), Springer-Verlag
    • A. Armando, L. Compagna, P. Ganty, SAT-based Model-Checking of Security Protocols using Planning Graph Analysis, In Proc. of the 12th International Symposium of Formal Methods Europe (FME), LNCS 2805, Springer-Verlag 2003.
    • (2003) LNCS , vol.2805
    • Armando, A.1    Compagna, L.2    Ganty, P.3
  • 8
    • 26444497860 scopus 로고    scopus 로고
    • The Avispa Tool for automated validation of internet security protocols and applications
    • Proc. Of Computer Aided Verification, Springer Verlag
    • A. Armando, A. et al., The Avispa Tool for automated validation of internet security protocols and applications, Proc. Of Computer Aided Verification, Lecture Notes in Computer Science (LNCS) 3576. Springer Verlag, 2005.
    • (2005) Lecture Notes in Computer Science (LNCS) , vol.3576
    • Armando, A.1
  • 10
    • 0142188052 scopus 로고    scopus 로고
    • An On-The-Fly Model-Checker for Security Protocol Analysis
    • In E. Snekkenes and D. Gollmann, editors, Proc. Of ESORICS'03, Springer-Verlag
    • D. Basin, S. Mödersheim, L. Viganò, An On-The-Fly Model-Checker for Security Protocol Analysis, In E. Snekkenes and D. Gollmann, editors, Proc. Of ESORICS'03, LNCS 2808, Springer-Verlag 2003, pp. 253-270.
    • (2003) LNCS , vol.2808 , pp. 253-270
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 11
    • 67449100042 scopus 로고    scopus 로고
    • Improvements on the Genet and Klay Technique to Automatically Verify Security Protocols
    • Proc. of AVIS'04
    • Y. Boichut, et al., Improvements on the Genet and Klay Technique to Automatically Verify Security Protocols, Proc. of AVIS'04, ENTCS.
    • ENTCS
    • Boichut, Y.1
  • 12
    • 33646931594 scopus 로고    scopus 로고
    • Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS)
    • S. Blake-Wilson, P. Lamber, Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS), Request for Comments 3278, 2002.
    • (2002) Request for Comments , vol.3278
    • Blake-Wilson, S.1    Lamber, P.2
  • 13
    • 80051982639 scopus 로고
    • NetBill security and transaction protocol
    • In Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce
    • B. Cox, J. D. Tygar, M. Sirbu. NetBill security and transaction protocol. In Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1, 77-88. 1995.
    • (1995) , vol.1 , pp. 77-88
    • Cox, B.1    Tygar, J.D.2    Sirbu, M.3
  • 14
    • 71049157039 scopus 로고    scopus 로고
    • Secure Negotiation in Virtual Organizations
    • In Proceedings of the 10th IEEE on International Enterprise Distributed Object Computing Conference Workshops. IEEE Computer Society
    • S. Darko-Ampem, M. Katsoufi, P. Giambiagi, Secure Negotiation in Virtual Organizations. In Proceedings of the 10th IEEE on International Enterprise Distributed Object Computing Conference Workshops. IEEE Computer Society. 2006.
    • (2006)
    • Darko-Ampem, S.1    Katsoufi, M.2    Giambiagi, P.3
  • 15
    • 48649086330 scopus 로고    scopus 로고
    • Broker-Based Secure Negotiation of Intellectual Property Rights
    • In Proceedings of the 4th International Conference on Information Security, Springer-Verlag
    • J. Delgado, I. Gallego, X. Perramon. Broker-Based Secure Negotiation of Intellectual Property Rights. In Proceedings of the 4th International Conference on Information Security, pp. 486-496. Springer-Verlag. 2001.
    • (2001) , pp. 486-496
    • Delgado, J.1    Gallego, I.2    Perramon, X.3
  • 16
    • 0003286492 scopus 로고    scopus 로고
    • The TLS Protocol Version 1.0
    • January
    • T. Dierks, C. Allen, The TLS Protocol Version 1.0. RFC 2246. January 1999.
    • (1999) RFC , vol.2246
    • Dierks, T.1    Allen, C.2
  • 17
    • 4444331854 scopus 로고
    • Randomness Recommendations for Security
    • December
    • D. Eastlake, S. Crocker, J. Schiller, "Randomness Recommendations for Security", RFC 1750, December 1994.
    • (1994) RFC , vol.1750
    • Eastlake, D.1    Crocker, S.2    Schiller, J.3
  • 18
    • 84957060126 scopus 로고    scopus 로고
    • Abuse-free optimistic contract signing
    • In proceedings of CRYPTO'99
    • J. Garay, M. Jakobsson, P. MacKenzie, Abuse-free optimistic contract signing, In proceedings of CRYPTO'99, Lecture Notes in Computer Science 1666, pp. 449-466. 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 449-466
    • Garay, J.1    Jakobsson, M.2    MacKenzie, P.3
  • 22
    • 84900847325 scopus 로고    scopus 로고
    • Improving fairness and privacy of Zhou-Gollmann's fair non-repudiation protocol
    • Proceedings of 1999 ICPP Workshops on Security (IWSEC), IEEE Computer Society, Sep. 21-22
    • K. Kim, S. Park, J. Baek, Improving fairness and privacy of Zhou-Gollmann's fair non-repudiation protocol, Proceedings of 1999 ICPP Workshops on Security (IWSEC), IEEE Computer Society, Sep. 21-22, pp.140-145. 1999.
    • (1999) , pp. 140-145
    • Kim, K.1    Park, S.2    Baek, J.3
  • 23
    • 0036836682 scopus 로고    scopus 로고
    • An intensive survey of fair non-repudiation protocols
    • Elsevier, Nov
    • S. Kremer, O. Markowitch, J. Zhou, An intensive survey of fair non-repudiation protocols, Computer Communications, 25(17): 1606-1621. Elsevier, Nov. 2002.
    • (2002) Computer Communications , vol.25 , Issue.17 , pp. 1606-1621
    • Kremer, S.1    Markowitch, O.2    Zhou, J.3
  • 25
    • 77952325597 scopus 로고    scopus 로고
    • Selecting theories and nonce generation for recursive protocols
    • In Proceedings of the 2007 ACM workshop on Formal methods in security engineering, Fairfax, Virginia, USA
    • K. O. Kürtz, R. Küsters, T. Wilke. Selecting theories and nonce generation for recursive protocols. In Proceedings of the 2007 ACM workshop on Formal methods in security engineering, pp. 61-70. Fairfax, Virginia, USA. 2007.
    • (2007) , pp. 61-70
    • Kürtz, K.O.1    Küsters, R.2    Wilke, T.3
  • 26
    • 0038570797 scopus 로고    scopus 로고
    • An Agent-Based Negotiation Model Supporting Transactions in Electronic Commerce
    • Proceedings of the 11th International Workshop on Database and Expert Systems Applications, IEEE Computer Society
    • B. Limthanmaphon, Y. Zhang, Z. Zhang. An Agent-Based Negotiation Model Supporting Transactions in Electronic Commerce. Proceedings of the 11th International Workshop on Database and Expert Systems Applications, IEEE Computer Society, 2000.
    • (2000)
    • Limthanmaphon, B.1    Zhang, Y.2    Zhang, Z.3
  • 28
    • 35248855514 scopus 로고    scopus 로고
    • On fairness in exchange protocols
    • In Pil Joong Lee and Chae Hoon Lim, editors, 5th International Conference on Information Security and Cryptology (ICISC 2002), Seoul, Korea, November
    • O. Markowitch, D. Gollmann, D. S. Kremer, On fairness in exchange protocols, In Pil Joong Lee and Chae Hoon Lim, editors, 5th International Conference on Information Security and Cryptology (ICISC 2002), volume 2587 of Lecture Notes in Computer Science, pages 451-464, Seoul, Korea, November 2002.
    • (2002) Lecture Notes in Computer Science , vol.2587 , pp. 451-464
    • Markowitch, O.1    Gollmann, D.2    Kremer, D.S.3
  • 29
    • 0003508560 scopus 로고    scopus 로고
    • Specification for the Advanced Encryption Standard (AES)
    • National Institute of Standards and Technology, FIPS 197. November 26
    • National Institute of Standards and Technology, Specification for the Advanced Encryption Standard (AES), FIPS 197. November 26, 2001.
    • (2001)
  • 37
    • 37149009790 scopus 로고    scopus 로고
    • Automatically Analysing Non-repudiation with Authentication
    • Proceedings of 3rd Taiwanese-French Conference on Information Technology (TFIT), Nancy, France
    • J. Santiago and L. Vigneron, Automatically Analysing Non-repudiation with Authentication, Proceedings of 3rd Taiwanese-French Conference on Information Technology (TFIT), 541--554, Nancy, France, 2006.
    • (2006) , pp. 541-554
    • Santiago, J.1    Vigneron, L.2
  • 40
    • 1642515444 scopus 로고    scopus 로고
    • DocLog: An Electronic Contract Representation Language
    • In Proceedings of the 11th International Workshop on Database and Expert Systems Applications. IEEE Computer Society
    • Y. Tan, W. Thoen. DocLog: An Electronic Contract Representation Language. In Proceedings of the 11th International Workshop on Database and Expert Systems Applications. IEEE Computer Society. 2000.
    • (2000)
    • Tan, Y.1    Thoen, W.2
  • 42
    • 33750930529 scopus 로고    scopus 로고
    • An abuse-free fair contract signing protocol based on the RSA signature
    • Proceedings of the 14th international conference on World Wide Web, Japan
    • G. Wang, An abuse-free fair contract signing protocol based on the RSA signature. Proceedings of the 14th international conference on World Wide Web, 412 - 421, Japan. 2005.
    • (2005) , pp. 412-421
    • Wang, G.1
  • 43
    • 67449102443 scopus 로고    scopus 로고
    • Word Wide Web Consortium (W3C). XML-Signature Syntax and Processing. W3C Recommendation. 12 February 2002
    • Word Wide Web Consortium (W3C). XML-Signature Syntax and Processing. W3C Recommendation. 12 February 2002.
  • 44
    • 84880146881 scopus 로고    scopus 로고
    • A Non-Repudiation Message Transfer Protocol for E- commerce
    • IEEE International Conference on E-Commerce Technology (CEC'03)
    • S. Yang, S.Y.W. Su, H. Lam, A Non-Repudiation Message Transfer Protocol for E- commerce. IEEE International Conference on E-Commerce Technology (CEC'03), 2003.
    • (2003)
    • Yang, S.1    Su, S.Y.W.2    Lam, H.3
  • 46
    • 0034239310 scopus 로고    scopus 로고
    • Application Layer Anycasting: A Server Selection Architecture and Use in a Replicated Web Service
    • August
    • E. Zegura, M. Ammar, Z. Fei, S. Bhattacharjee, Application Layer Anycasting: A Server Selection Architecture and Use in a Replicated Web Service, IEEE/ACM Transactions on Networking, Vol. 8, No. 4, August 2000, pp. 455-467.
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , Issue.4 , pp. 455-467
    • Zegura, E.1    Ammar, M.2    Fei, Z.3    Bhattacharjee, S.4
  • 47
    • 0029724319 scopus 로고    scopus 로고
    • A Fair Non-repudiation Protocol
    • proceedings of 1996 IEEE Symposium on Security and Privacy, Oakland, CA, May
    • J. Zhou, D. Gollmann, A Fair Non-repudiation Protocol, proceedings of 1996 IEEE Symposium on Security and Privacy, pp. 55-61, Oakland, CA, May 1996.
    • (1996) , pp. 55-61
    • Zhou, J.1    Gollmann, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.