Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,680,947 papers from all fields of science
Search
Sign In
Create Free Account
Non-repudiation
Known as:
Nonrepudiation
, Repudiation
Non-repudiation refers to a state of affairs where the author of a statement will not be able to successfully challenge the authorship of the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
45 relations
Authentication server
CAdES (computing)
Coding theory
Common Access Card
Expand
Broader (2)
Computer security
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Implementation of Eap with RSA for Enhancing The Security of Cloud Computing
S. Marium
,
Qamar Nazir
,
A. Shaikh
,
S. Ahthasham
,
Mirza Aamir Mehmood
2012
Corpus ID: 61768337
Cloud Computing is emerging approach because of high availability, efficient cost and performance. In Cloud Computing, services…
Expand
2008
2008
On Secure and Anonymous Buyer-Seller Watermarking Protocol
Mina Deng
,
B. Preneel
Third International Conference on Internet and…
2008
Corpus ID: 1543486
Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights…
Expand
Review
2007
Review
2007
Human recognition using biometrics: an overview
A. Ross
,
Anil K. Jain
Ann. des Télécommunications
2007
Corpus ID: 6954000
Establishing identity is becoming critical in our vastly interconnected society. Questions such as “Is she really who she claims…
Expand
2006
2006
The great stink of Paris and the Nineteenth-Century struggle against filth and germs
D. Barnes
2006
Corpus ID: 142799985
In August and September of 1880, all of Paris was suffused by an odor so putrid, so nauseating and fetid, that it sparked…
Expand
Highly Cited
2004
Highly Cited
2004
Secure Hashed Diffie-Hellman over Non-DDH Groups
R. Gennaro
,
H. Krawczyk
,
T. Rabin
International Conference on the Theory and…
2004
Corpus ID: 267015
The Diffie-Hellman (DH) transform is a basic cryptographic primitive used in innumerable cryptographic applications, most…
Expand
2003
2003
Non-Walrasian equilibria and the law of one price
Leonidas C. Koutsougeras
Journal of Economics Theory
2003
Corpus ID: 1358667
2003
2003
Toward explicit policy management for virtual organizations
G. Wasson
,
M. Humphrey
Proceedings POLICY . IEEE 4th International…
2003
Corpus ID: 253560
A virtual organization (VO) is a dynamic collection of distributed resources that are shared by a dynamic collection of users…
Expand
Highly Cited
1996
Highly Cited
1996
Observations on Non-repudiation
Jianying Zhou
,
D. Gollmann
International Conference on the Theory and…
1996
Corpus ID: 40659634
This paper discusses non-repudiation services regarding the transfer of a message and classifies the roles of trusted third…
Expand
Review
1996
Review
1996
Investigation of non-repudiation protocols
Yongfei Han
Australasian Conference on Information Security…
1996
Corpus ID: 27714158
The paper surveys the state of non-repudiation protocols. A fair non-repudiation protocol should provide an equal protection to…
Expand
Highly Cited
1987
Highly Cited
1987
Country Risk and the Organization of International Capital Transfer
J. Eaton
,
Mark Gersovitz
1987
Corpus ID: 15158957
Foreign portfolio investment is threatened by the risk of default and repudiation, while direct foreign investment is threatened…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE