Keywords: عدم تسویه حساب; Security; Authentication; Signature; One-time password; PKI; Financial institution; Bank; Non-repudiation; Key management; Security protocols; Data integrity; Entropy; Consequential evidence
مقالات ISI ترجمه شده عدم تسویه حساب
مقالات ISI عدم تسویه حساب (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: عدم تسویه حساب; Group communications; Security; Non-repudiation; Privacy preserving; Asymmetric group key agreement;
Keywords: عدم تسویه حساب; Long-term; Archiving; Authenticity; Non-repudiation; Integrity; Existence; Time-stamp; Notarization; Replication; Trust
A Blockchain-Based Notarization Service for Biomedical Knowledge Retrieval
Keywords: عدم تسویه حساب; Biomedical repositories; Cryptographic techniques; Blockchain; Integrity; Non-repudiation; Versioning;
An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network
Keywords: عدم تسویه حساب; Ad hoc network; Mutual authentication; Non-repudiation; IBE; Bilinear pairings;
Endeavouring to be in the good books. Awarding DTN network use for acknowledging the reception of bundles
Keywords: عدم تسویه حساب; Incentive schemes; Delay Tolerant Networks; Nash equilibrium; Non-repudiation; Receipt exchange; Cooperation;
On security of a certificateless signcryption scheme
Keywords: عدم تسویه حساب; Certificateless cryptography; Signcryption; Confidentiality; Non-repudiation; Public key replacement attack
Cross-border certified electronic mailing: A European perspective
Keywords: عدم تسویه حساب; Cross-border certified electronic mail; Cross-border registered electronic mail; Non-repudiation; Evidences; Fair exchange; Certified mail systems; Certified electronic mail law; Interoperability
How to achieve non-repudiation of origin with privacy protection in cloud computing
Keywords: عدم تسویه حساب; Security; Non-repudiation; Privacy; Protocol
A taxonomy and survey of attacks on digital signatures
Keywords: عدم تسویه حساب; Security; Taxonomy; Digital signature; Attacks; Non-repudiation; Public key infrastructure
Analysis of frame attack on Hsu et al.’s non-repudiable threshold multi-proxy multi-signature scheme with shared verification
Keywords: عدم تسویه حساب; Proxy signature; Threshold proxy signature; Threshold multi-proxy multi-signature scheme; Non-repudiation
Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures
Keywords: عدم تسویه حساب; Wireless sensor networks; Non-repudiation; Digital signature; Network lifetime; Linear programming
Adaptation of agent-based non-repudiation protocol to mobile digital right management (DRM)
Keywords: عدم تسویه حساب; Mobile agent; Non-repudiation; PKI; Digital right management; Proxy certificate
A survey of certified mail systems provided on the Internet
Keywords: عدم تسویه حساب; Survey; Certified electronic mail; Registered electronic mail; Non-repudiation; Evidences; Fair exchange; Trusted third parties; Interoperability
A remote interactive non-repudiation multimedia-based m-learning system
Keywords: عدم تسویه حساب; m-Leaning; e-Learning; Non-repudiation; Identity management; Multimedia interactive communication
A traceable E-cash transfer system against blackmail via subliminal channel
Keywords: عدم تسویه حساب; Subliminal channel; Blackmail; E-cash; Transfer system; Non-repudiation
A fair Non-repudiation service in a web services peer-to-peer environment
Keywords: عدم تسویه حساب; Non-repudiation; SECTET; Protocol; Web services
An optimistic fair exchange protocol based on signature policies
Keywords: عدم تسویه حساب; Security; E-commerce; Non-repudiation; Fair exchange; Electronic signature; Digital signature; Signature policy; PKI; Standards
Some common attacks against certified email protocols and the countermeasures
Keywords: عدم تسویه حساب; Certified email; Fair exchange; Non-repudiation; Digital signature; Security protocol
Fine-grained forward-secure signature schemes without random oracles
Keywords: عدم تسویه حساب; Digital signatures; Forward security; Non-repudiation
Remarks on a new key authentication scheme based on discrete logarithms
Keywords: عدم تسویه حساب; Key authentication; Public key; Non-repudiation;
Comment: cryptanalysis of Lee-Hwang-Li's key authentication scheme
Keywords: عدم تسویه حساب; Key authentication; Public key; Non-repudiation;
Improved public key authentication scheme for non-repudiation
Keywords: عدم تسویه حساب; Cryptography; Key authentication; Public key; Non-repudiation;
A fair and secure mobile billing system
Keywords: عدم تسویه حساب; Billing system; Fairness; Hashing chain; Non-repudiation;
H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming
Keywords: عدم تسویه حساب; Data source authentication; Non-repudiation; Adaptive hash-chaining; Multicast flows; Multicast security;
RLH: receiver driven layered hash-chaining for multicast data origin authentication
Keywords: عدم تسویه حساب; Data origin authentication; Non-repudiation; Layered hash-chaining; Multicast streaming;