[1] Zhou J. Non-Repudiation in Electronic Commerce [M]. London: Artech House, 2001.
[2] ISO/IEC. 1991. 1st WD 13888-2. Non-repudiation Using a Symmetric Key Algorithm [S]. Geneva: ISO/IEC, 1991.
[3] ISO/IEC. 1996. DIS 10181-4. Information Technology—Open Systems Interconnection—Security Frameworks in Open Systems—Part 4: Non-repudiation [S]. Geneva: ISO/IEC,1996.
[4] ISO/IEC. 1997. 2nd CD 13888-3. Information Technology—Security Techniques—Non-repudiation—Part3: Using Asymmetric Techniques [S]. Geneva: ISO/IEC, 1997.
[5] ISO/IEC. 1998. 3rd CD 13888-2. Information Technology—Security Techniques—Non-repudiation—Part2: Using Symmetric Encipherment Algorithms [S]. Geneva: ISO/IEC,1998.
[6] ISO/IEC. 2004. 13888-1. Information Technology—Security Techniques—Non-repudiation—Part 1: General Model [S]. Geneva: ISO/IEC, 2004.
[7] Zhou J, Gollmann D. A Fair Non-repudiation Protocol [C]//Proc of 1996 IEEE Symposium on Security and Privacy. Washington: IEEE Computer Security Press, 1996: 55-61.
[8] Kremer S, Markowitch O. Optimistic Non-repudiable Information Exchange [C]//Proc of 21st Symp on Information Theory in the Benelux, Werkgemeenschap Informatie-en Communicatietheorie. Enschede : Lecture Notesin Computer Science, 2000: 139-146.
[9] Robinson P, Cook N, Shrivastava S. Implementing Fair Non-repudiable Interactions with Web Services. Technical Report CSTR [R]. Newcastle: School of Computing Science, Univ Newcastle, 2005.
[10] Kremer S, Markowitch O, Zhou J. An Intensive Survey of Fair Non-repudiation Protocols [J]. Computer Communications, 2002, 25(17): 1606-1621.
[11] You C, Zhou J, Lam K. On the Efficient Implementation of Fair Non-repudiation [J]. Computer Communication Review, 1998, 28(5): 50-60. |