- About this Journal ·
- Abstracting and Indexing ·
- Advance Access ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Articles in Press ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Subscription Information ·
- Table of Contents
Discrete Dynamics in Nature and Society
Volume 2014 (2014), Article ID 904717, 7 pages
Fairness Analysis for Multiparty Nonrepudiation Protocols Based on Improved Strand Space
1School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China
2Shanghai Key Lab of Modern Optical System, Department of Control Science and Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China
Received 5 November 2013; Revised 21 November 2013; Accepted 21 November 2013; Published 2 January 2014
Academic Editor: Guoliang Wei
Copyright © 2014 Lei Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
- S. Gritzalis, D. Spinellis, and P. Georgiadis, “Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification,” Computer Communications, vol. 22, no. 8, pp. 697–709, 1999.
- R. Kailar, “Accountability in electronic commerce protocols,” IEEE Transactions on Software Engineering, vol. 22, no. 5, pp. 313–328, 1996.
- L. Botao and L. Junzhou, “On timeliness of a fair non-repudiation protocol,” in Proceedings of the 3rd International Conference on Information Security (InfoSecu '04), pp. 99–106, Shanghai, China, November 2004.
- Y. Xu and X. Xie, “Analysis of electronic commerce protocols based on extended rubin logic,” in Proceedings of the 9th International Conference for Young Computer Scientists (ICYCS '08), pp. 2079–2084, Hunan, China, November 2008.
- W. Jamroga, S. Mauw, and M. Melissen, “Fairness in non-repudiation protocols,” in Proceedings of the 7th International workshop on security and trust management, pp. 122–139, Copenhagen, Denmark, June 2011.
- S. Kremer and J. F. Raskin, “A game-based verification of non-repudiation and fair exchange protocols,” in CONCUR, 2001—Concurrency Theory, pp. 551–565, Springer, Berlin, Heidelberg, 2001.
- R. Lanotte, A. Maggiolo-Schettini, and A. Troina, “Automatic analysis of a non-repudiation protocol,” Electronic Notes in Theoretical Computer Science, vol. 112, pp. 113–129, 2005.
- Y. Guo, C. Lin, and H. Yin, “Formal proof of the IDOP-SP protocol based on the Petri Net,” in Proceedings of the IEEE International Conference on Networking, Architecture, and Storage (IEEE NAS '08), pp. 161–162, Chongqing, June 2008.
- L. Chen and X. Li, “Cryptographic protocol logic for analyzing a variety of security properties and its formal semantics,” International Journal of Advancements in Computing Technology, vol. 4, no. 9, pp. 283–293, 2012.
- J. Dreier, P. Lafourcade, and Y. Lakhnech, “Formal verification of e-Auction protocols,” in Proceedings of the 2nd International Conference on Principles of Security and Trust, pp. 247–266, Rome, Italy, 2013.
- H. Zhang, “Analysis on authentication secrecy of non-repudiation protocols,” in Proceedings of the International Conference on Electrical and Electronics Engineering, pp. 705–711, Wuhan, China, 2011.
- G. Draper-Gil, J. Zhou, J. L. Ferrer-Gomila, and M. F. Hinarejos, “An optimistic fair exchange protocol with active intermediaries,” International Journal of Information Security, vol. 12, no. 4, pp. 299–318, 2013.
- S. Kremer and O. A. Markowitch, “Multi-party non-repudiation protocol,” in Proceedings of the 15th International Conference on Information Security, pp. 271–280, Beijing, China, 2000.
- J. Zhou, J. Onieva, and J. Lopez, “Optimized multi-party certified email protocols,” Information Management and Computer Security, vol. 13, no. 5, pp. 350–366, 2005.
- F. J. T. Fabrega, J. C. Herzog, and J. D. Guttman, “Strand spaces: Why is a security protocol correct,” in Proceedings of the IEEE Symposium on Security and Privacy, pp. 160–171, Oakland, Calif, USA, 1998.
- K. Kim, S. Park, and J. Baek, “Improving fairness and privacy of Zhou-Gollmanns fair non-repudiation protocol,” in Proceedings of the International Workshops on Parallel Processing, pp. 140–145, IEEE Computer Society Press, 1999.
- J. Zhou and D. Gollmann, “Fair non-repudiation protocol,” in Proceedings of the 17th IEEE Symposium on Security and Privacy, pp. 55–61, May 1996.