نتایج جستجو برای: refusing to accept repudiation

تعداد نتایج: 10614899  

Journal: :Swiss medical weekly 2008
Markus Gnädinger Markus Gassner Gaudenz Bachmann

PRINCIPLES Children whose parents use complementary and alternative medicine (CAM) often show a lower rate of vaccination than those of parents favouring conventional medicine. We have investigated whether this applies to the paediatric patients presenting to an emergency department in German-speaking Switzerland, where popularity of CAM is rather high. METHODS A cross-sectional survey was pe...

2006
Kun Wei James Heather

We use a PVS embedding of the stable failures model of CSP to verify non-repudiation protocols, allowing us to prove the correctness of properties that are difficult to analyze in full generality with a model checker. The PVS formalization comprises a semantic embedding of CSP and a collection of theorems and proof rules for reasoning about non-repudiation properties. The well-known Zhou-Gollma...

2000
Ilja Ponka

This paper discusses the legal aspects of digital signatures especially in the context of non-repudiation. Non-repudiation is an essential requirement for the full-developed contract law. Traditional maxim pacta sunt servanda (contracts must be fulfilled) could not exist, if the people were always able to deny the binding force of contracts, to repudiate them, if it was in their interest to do so.

Journal: :SSRN Electronic Journal 2014

2008
Francis Klay Laurent Vigneron

Non-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary. Formal methods are clever and without error, therefore using them for verifying such protocols is crucial. In this purpose, we show how to partially represent non-repudiation as a combination of authentications on the Fair Zhou-Gollmann protocol. After discussing...

2004
Kuenliang Sue Wanpu Hsieh

Trade security is the main point of the payment system. The system should fit the security issues such as confidentiality, authentication, and non-repudiation. However, the privacy problem seems to be ignored. This article proposes a new structure to improve the privacy of mobile payment system when consumers buy something via mobile device. The new system needs to fit three points: familiarity...

Journal: :Computer Languages, Systems & Structures 2010
Mayla Brusò Agostino Cortesi

This work introduces a formal analysis of the non-repudiation property for security protocols. Protocols are modelled in the process calculus LYSA, using an extended syntax with annotations. Non-repudiation is verified using a Control Flow Analysis, following the same approach of M. Buchholtz and H. Gao for authentication and freshness analyses. The result is an analysis that can statically che...

2016
M. V. HARISH KUMAR k. Venkaiah

Vehicular ad hoc networks (VANETs) are the specific class of Mobile ad hoc networks (MANETs).In a VANET, vehicles will rely on the integrity of received data for deciding when to present alerts to drivers. In this paper, we investigate the authentication issues with privacy preservation and non-repudiation in VANETs. We propose a novel framework with preservationand repudiation (ACPN) for VANET...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید