Author:
Radomirović Saša,Dashti Mohammad Torabi
Publisher
Springer International Publishing
Reference6 articles.
1. Lecture Notes in Computer Science;C Boyd,2000
2. Gürgens, S., Rudolph, C., Vogt, H.: On the security of fair non-repudiation protocols. Int. J. Inf. Secur. 4(4), 253–262 (2005)
3. Lecture Notes in Computer Science;T Deursen van,2009
4. van Deursen, T., Radomirović, S.: Attacks on RFID protocols (version 1.1). Cryptology ePrint Archive, Report 2008/310, August 2009.
http://eprint.iacr.org/2008/310
5. Zhou, J.: Achieving fair non-repudiation in electronic transactions. J. Organ. Comput. Electron. Commer. 11(4), 253–267 (2001)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献