Secure multi-party non-repudiation protocols and applications:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer
2009
|
Schriftenreihe: | Advances in information security
43 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVIII, 188 S. Ill., graph. Darst. |
ISBN: | 0387756299 9780387756295 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV023100984 | ||
003 | DE-604 | ||
005 | 20090504 | ||
007 | t | ||
008 | 080128s2009 gw ad|| |||| 00||| eng d | ||
015 | |a 07,N40,0070 |2 dnb | ||
016 | 7 | |a 985621818 |2 DE-101 | |
020 | |a 0387756299 |c Gb. : ca. EUR 98.87 (freier Pr.), ca. sfr 161.00 (freier Pr.) |9 0-387-75629-9 | ||
020 | |a 9780387756295 |c Gb. : ca. EUR 98.87 (freier Pr.), ca. sfr 161.00 (freier Pr.) |9 978-0-387-75629-5 | ||
024 | 3 | |a 9780387756295 | |
028 | 5 | 2 | |a 12116799 |
035 | |a (OCoLC)300398318 | ||
035 | |a (DE-599)DNB985621818 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-355 | ||
082 | 0 | |a 658.478 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Onieva, Jose A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Secure multi-party non-repudiation protocols and applications |c by José A. Onieva ; Javier Lopez ; Jianying Zhou |
264 | 1 | |a New York, NY |b Springer |c 2009 | |
300 | |a XVIII, 188 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Advances in information security |v 43 | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 4 | |a Electronic commerce |x Security measures | |
650 | 0 | 7 | |a Mehrparteiensystem |0 (DE-588)4169312-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mehrparteienprotokoll |0 (DE-588)4480818-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Mehrparteienprotokoll |0 (DE-588)4480818-5 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Mehrparteiensystem |0 (DE-588)4169312-7 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Lopez, Javier |e Verfasser |4 aut | |
700 | 1 | |a Zhou, Jianying |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-0-387-75630-1 |
830 | 0 | |a Advances in information security |v 43 |w (DE-604)BV014168308 |9 43 | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016303704&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016303704 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804137358954594304 |
---|---|
adam_text | Contents
Part I Introduction and Fundamentals
1
Introduction
................................................... 3
1.1
Introduction to E-commerce
.................................. 3
1.2
Security Issues in E-commerce
............................... 6
1.3
Security Services and Protocols
............................... 8
1.4
The Non-repudiation Service
................................. 10
1.5
Challenges and Goals of this Book
............................ 12
Appendix
...................................................... 14
2
Fundamentals of Non-repudiation
............................... 17
2.1
Specific Non-repudiation Services
............................ 17
2.2
Evidence
.................................................. 19
2.3
Roles of the TTP
........................................... 21
2.4
Non-repudiation Phases
..................................... 23
2.5
Non-repudiation Requirements
............................... 25
2.6
Analysis of Standards
....................................... 27
2.7
Supporting Legal Framework
................................. 29
Part II Multi-Party Non-repudiation
3
Multi-Party Non-repudiation: Analysis
........................... 35
3.1
General MPNRProblem
..................................... 35
3.1.1
Definitions
.......................................... 35
3.1.2
State of the Art Analysis
.............................. 40
3.2
1-N MPNR Problem and State of the Art
....................... 47
3.3
General Contribution to Multi-Party Problem
................... 50
3.3.1
Model Definition
.................................... 53
3.3.2
Cryptographic Primitives
.............................. 54
3.4
Summary of MPNR Protocol Properties
........................ 57
x
Contents
4 New Design
Approaches for MPNR
.............................. 59
4.1 MPNR
Protocol for Different Messages
........................ 60
4.1.1
On-line MPNR Protocol for Distribution of Several
Messages
........................................... 60
4.1.2
Optimistic MPNR Protocol for Exchange of Different
Messages
........................................... 64
4.1.3
Fairness vs. Collusion
................................ 71
4.1.4
Further Discussions
.................................. 71
4.2
Agent-Mediated Non-repudiation Protocols
..................... 74
4.2.1
Model
.............................................. 75
4.2.2
First Solution
....................................... 75
4.2.3
Simple Agent-Mediated Protocol
....................... 77
4.2.4
Extension to Multiple Recipients
....................... 80
4.2.5
Further Extension to Multiple Messages
................. 84
4.2.6
Applications
........................................ 87
4.2.7
Requirements Fulfillment
............................. 88
4.3
Event-Oriented Simulation
................................... 89
4.3.1
Protocol
............................................ 89
4.3.2
Simulation Model
.................................... 90
4.3.3
Main Model Simulation Events
........................ 94
4.3.4
Output Analysis
..................................... 98
Partili
Applications
5
Multi-Party Non-repudiation Applications
........................109
5.1
Multi-Party Optimistic Fair
CEM
.............................109
5.1.1
A Protocol for Fair
CEM
with Deadline Time
............110
5.1.2
Extension to Fair
CEM
with Asynchronous Timeliness
.....
Ill
5.1.3
Extension to Multi-Party Fair
CEM
.....................113
5.1.4
Requirements Fulfillment
.............................116
5.2
Multi-Party Contract Signing
.................................119
5.2.1
A New Synchronous MPCS Protocol
....................120
5.2.2
Requirements Fulfillment
.............................123
5.2.3
Achieving Abuse-Freeness
............................125
5.2.4
Achieving Timeliness
.................................127
6
Scenarios Supported by MPNR Services
..........................131
6.1
Extension of an OMA-based DRM Framework
..................132
6.1.1
Protocol
............................................135
6.1.2
Design and Implementation
............................140
6.1.3
Requirements Fulfillment
.............................142
6.2
Practical Service Charge for P2P Content Distribution
............145
6.2.1
Scenario and Requirements
............................145
6.2.2
P2P Payment Protocol
................................147
6.2.3
A New Approach
....................................148
Contents xi
6.2.4
Requirements Fulfillment
.............................152
6.2.5
Practical View
.......................................155
6.3
Free Roaming Agent Result-Truncation Defense
................157
6.3.1
Security Requirements
................................158
6.3.2
Cheng-Wei Protocol
..................................159
6.3.3
Security Analysis
....................................162
6.3.4
Amendments
........................................164
6.3.5
Security Requirements Analysis
........................166
Part IV
7
Conclusions
...................................................171
References
.........................................................177
Index
.............................................................183
|
adam_txt |
Contents
Part I Introduction and Fundamentals
1
Introduction
. 3
1.1
Introduction to E-commerce
. 3
1.2
Security Issues in E-commerce
. 6
1.3
Security Services and Protocols
. 8
1.4
The Non-repudiation Service
. 10
1.5
Challenges and Goals of this Book
. 12
Appendix
. 14
2
Fundamentals of Non-repudiation
. 17
2.1
Specific Non-repudiation Services
. 17
2.2
Evidence
. 19
2.3
Roles of the TTP
. 21
2.4
Non-repudiation Phases
. 23
2.5
Non-repudiation Requirements
. 25
2.6
Analysis of Standards
. 27
2.7
Supporting Legal Framework
. 29
Part II Multi-Party Non-repudiation
3
Multi-Party Non-repudiation: Analysis
. 35
3.1
General MPNRProblem
. 35
3.1.1
Definitions
. 35
3.1.2
State of the Art Analysis
. 40
3.2
1-N MPNR Problem and State of the Art
. 47
3.3
General Contribution to Multi-Party Problem
. 50
3.3.1
Model Definition
. 53
3.3.2
Cryptographic Primitives
. 54
3.4
Summary of MPNR Protocol Properties
. 57
x
Contents
4 New Design
Approaches for MPNR
. 59
4.1 MPNR
Protocol for Different Messages
. 60
4.1.1
On-line MPNR Protocol for Distribution of Several
Messages
. 60
4.1.2
Optimistic MPNR Protocol for Exchange of Different
Messages
. 64
4.1.3
Fairness vs. Collusion
. 71
4.1.4
Further Discussions
. 71
4.2
Agent-Mediated Non-repudiation Protocols
. 74
4.2.1
Model
. 75
4.2.2
First Solution
. 75
4.2.3
Simple Agent-Mediated Protocol
. 77
4.2.4
Extension to Multiple Recipients
. 80
4.2.5
Further Extension to Multiple Messages
. 84
4.2.6
Applications
. 87
4.2.7
Requirements Fulfillment
. 88
4.3
Event-Oriented Simulation
. 89
4.3.1
Protocol
. 89
4.3.2
Simulation Model
. 90
4.3.3
Main Model Simulation Events
. 94
4.3.4
Output Analysis
. 98
Partili
Applications
5
Multi-Party Non-repudiation Applications
.109
5.1
Multi-Party Optimistic Fair
CEM
.109
5.1.1
A Protocol for Fair
CEM
with Deadline Time
.110
5.1.2
Extension to Fair
CEM
with Asynchronous Timeliness
.
Ill
5.1.3
Extension to Multi-Party Fair
CEM
.113
5.1.4
Requirements Fulfillment
.116
5.2
Multi-Party Contract Signing
.119
5.2.1
A New Synchronous MPCS Protocol
.120
5.2.2
Requirements Fulfillment
.123
5.2.3
Achieving Abuse-Freeness
.125
5.2.4
Achieving Timeliness
.127
6
Scenarios Supported by MPNR Services
.131
6.1
Extension of an OMA-based DRM Framework
.132
6.1.1
Protocol
.135
6.1.2
Design and Implementation
.140
6.1.3
Requirements Fulfillment
.142
6.2
Practical Service Charge for P2P Content Distribution
.145
6.2.1
Scenario and Requirements
.145
6.2.2
P2P Payment Protocol
.147
6.2.3
A New Approach
.148
Contents xi
6.2.4
Requirements Fulfillment
.152
6.2.5
Practical View
.155
6.3
Free Roaming Agent Result-Truncation Defense
.157
6.3.1
Security Requirements
.158
6.3.2
Cheng-Wei Protocol
.159
6.3.3
Security Analysis
.162
6.3.4
Amendments
.164
6.3.5
Security Requirements Analysis
.166
Part IV
7
Conclusions
.171
References
.177
Index
.183 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Onieva, Jose A. Lopez, Javier Zhou, Jianying |
author_facet | Onieva, Jose A. Lopez, Javier Zhou, Jianying |
author_role | aut aut aut |
author_sort | Onieva, Jose A. |
author_variant | j a o ja jao j l jl j z jz |
building | Verbundindex |
bvnumber | BV023100984 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)300398318 (DE-599)DNB985621818 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02484nam a2200589 cb4500</leader><controlfield tag="001">BV023100984</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090504 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080128s2009 gw ad|| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">07,N40,0070</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">985621818</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0387756299</subfield><subfield code="c">Gb. : ca. EUR 98.87 (freier Pr.), ca. sfr 161.00 (freier Pr.)</subfield><subfield code="9">0-387-75629-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387756295</subfield><subfield code="c">Gb. : ca. EUR 98.87 (freier Pr.), ca. sfr 161.00 (freier Pr.)</subfield><subfield code="9">978-0-387-75629-5</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9780387756295</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12116799</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)300398318</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB985621818</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Onieva, Jose A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure multi-party non-repudiation protocols and applications</subfield><subfield code="c">by José A. Onieva ; Javier Lopez ; Jianying Zhou</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 188 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security</subfield><subfield code="v">43</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mehrparteiensystem</subfield><subfield code="0">(DE-588)4169312-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mehrparteienprotokoll</subfield><subfield code="0">(DE-588)4480818-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mehrparteienprotokoll</subfield><subfield code="0">(DE-588)4480818-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Mehrparteiensystem</subfield><subfield code="0">(DE-588)4169312-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lopez, Javier</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Jianying</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-0-387-75630-1</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security</subfield><subfield code="v">43</subfield><subfield code="w">(DE-604)BV014168308</subfield><subfield code="9">43</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016303704&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016303704</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV023100984 |
illustrated | Illustrated |
index_date | 2024-07-02T19:44:42Z |
indexdate | 2024-07-09T21:11:02Z |
institution | BVB |
isbn | 0387756299 9780387756295 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016303704 |
oclc_num | 300398318 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | XVIII, 188 S. Ill., graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
series | Advances in information security |
series2 | Advances in information security |
spelling | Onieva, Jose A. Verfasser aut Secure multi-party non-repudiation protocols and applications by José A. Onieva ; Javier Lopez ; Jianying Zhou New York, NY Springer 2009 XVIII, 188 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Advances in information security 43 Unternehmen Business enterprises Computer networks Security measures Electronic commerce Security measures Mehrparteiensystem (DE-588)4169312-7 gnd rswk-swf Mehrparteienprotokoll (DE-588)4480818-5 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Mehrparteienprotokoll (DE-588)4480818-5 s Computersicherheit (DE-588)4274324-2 s DE-604 Mehrparteiensystem (DE-588)4169312-7 s 1\p DE-604 Lopez, Javier Verfasser aut Zhou, Jianying Verfasser aut Erscheint auch als Online-Ausgabe 978-0-387-75630-1 Advances in information security 43 (DE-604)BV014168308 43 Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016303704&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Onieva, Jose A. Lopez, Javier Zhou, Jianying Secure multi-party non-repudiation protocols and applications Advances in information security Unternehmen Business enterprises Computer networks Security measures Electronic commerce Security measures Mehrparteiensystem (DE-588)4169312-7 gnd Mehrparteienprotokoll (DE-588)4480818-5 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4169312-7 (DE-588)4480818-5 (DE-588)4274324-2 |
title | Secure multi-party non-repudiation protocols and applications |
title_auth | Secure multi-party non-repudiation protocols and applications |
title_exact_search | Secure multi-party non-repudiation protocols and applications |
title_exact_search_txtP | Secure multi-party non-repudiation protocols and applications |
title_full | Secure multi-party non-repudiation protocols and applications by José A. Onieva ; Javier Lopez ; Jianying Zhou |
title_fullStr | Secure multi-party non-repudiation protocols and applications by José A. Onieva ; Javier Lopez ; Jianying Zhou |
title_full_unstemmed | Secure multi-party non-repudiation protocols and applications by José A. Onieva ; Javier Lopez ; Jianying Zhou |
title_short | Secure multi-party non-repudiation protocols and applications |
title_sort | secure multi party non repudiation protocols and applications |
topic | Unternehmen Business enterprises Computer networks Security measures Electronic commerce Security measures Mehrparteiensystem (DE-588)4169312-7 gnd Mehrparteienprotokoll (DE-588)4480818-5 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Unternehmen Business enterprises Computer networks Security measures Electronic commerce Security measures Mehrparteiensystem Mehrparteienprotokoll Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016303704&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014168308 |
work_keys_str_mv | AT onievajosea securemultipartynonrepudiationprotocolsandapplications AT lopezjavier securemultipartynonrepudiationprotocolsandapplications AT zhoujianying securemultipartynonrepudiationprotocolsandapplications |