نتایج جستجو برای: refusing to accept repudiation
تعداد نتایج: 10614899 فیلتر نتایج به سال:
PRINCIPLES Children whose parents use complementary and alternative medicine (CAM) often show a lower rate of vaccination than those of parents favouring conventional medicine. We have investigated whether this applies to the paediatric patients presenting to an emergency department in German-speaking Switzerland, where popularity of CAM is rather high. METHODS A cross-sectional survey was pe...
We use a PVS embedding of the stable failures model of CSP to verify non-repudiation protocols, allowing us to prove the correctness of properties that are difficult to analyze in full generality with a model checker. The PVS formalization comprises a semantic embedding of CSP and a collection of theorems and proof rules for reasoning about non-repudiation properties. The well-known Zhou-Gollma...
This paper discusses the legal aspects of digital signatures especially in the context of non-repudiation. Non-repudiation is an essential requirement for the full-developed contract law. Traditional maxim pacta sunt servanda (contracts must be fulfilled) could not exist, if the people were always able to deny the binding force of contracts, to repudiate them, if it was in their interest to do so.
Non-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary. Formal methods are clever and without error, therefore using them for verifying such protocols is crucial. In this purpose, we show how to partially represent non-repudiation as a combination of authentications on the Fair Zhou-Gollmann protocol. After discussing...
Trade security is the main point of the payment system. The system should fit the security issues such as confidentiality, authentication, and non-repudiation. However, the privacy problem seems to be ignored. This article proposes a new structure to improve the privacy of mobile payment system when consumers buy something via mobile device. The new system needs to fit three points: familiarity...
This work introduces a formal analysis of the non-repudiation property for security protocols. Protocols are modelled in the process calculus LYSA, using an extended syntax with annotations. Non-repudiation is verified using a Control Flow Analysis, following the same approach of M. Buchholtz and H. Gao for authentication and freshness analyses. The result is an analysis that can statically che...
Vehicular ad hoc networks (VANETs) are the specific class of Mobile ad hoc networks (MANETs).In a VANET, vehicles will rely on the integrity of received data for deciding when to present alerts to drivers. In this paper, we investigate the authentication issues with privacy preservation and non-repudiation in VANETs. We propose a novel framework with preservationand repudiation (ACPN) for VANET...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید