A Survey on Optimistic Fair Digital Signature Exchange Protocols
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2
Abstract
Security services become crucial to many applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery, with the phenomenal growth of the Internet and open networks. For these applications fair exchange must be assured. A fair protocol allows two parties to exchange digital signatures over the Internet in a fair way, so that either each party gets the other’s signature, or neither party does. This paper, gives a survey on the most important fair and optimistic digital signature exchange protocols. Optimistic, means the third trusted party (TTP) is involved only in the situations where one party is cheating or the communication channel is interrupted, i.e., TTP is offline. As more business is conducted over the Internet, the fair-exchange problem is gaining greater importance. This paper also provides an analysis of basic features, security, and efficiency of digital signature exchange protocols.
Authors and Affiliations
Alfin Abraham , Vinodh Ewards , Harlay Maria Mathew
Trust-based Routing Security in MANETS
The advantage of Mobile Ad-hoc Networks (MANETs) is to orm a wireless network in the absence of fixed infrastructure. arly stages of routing protocols of MANETs were, incapable of handling security issues but by the in...
Music Controller based on Hand Gestures using Webcam
Interaction of human beings with computers can be done without any physical interface and this can be done using gestures. The paper addresses a solution to access the music player in the computer via the webcam. This pa...
Secure Web Service Using Call by Contract
A methodology for designing and composing services in a ecure manner. In particular, it’s concerned with safety roperties of service behavior. Services can enforce security olicies locally and can invoke other service...
A Recent Survey on Bloom Filters in Network Intrusion Detection Systems
Computer networks are prone to hacking, viruses and other malware; a Network Intrusion Detection System (NIDS) is needed to protect the end-user machines from threats. An effective NIDS is therefore a network security sy...
Intelligent Data Compression Approach in Multidimensional Data Warehouse
The problem with MOLAP is that large tables should be loaded in main memory, which can slow the system, even saturate the memory. In this work, we present a new compression method, called BTC, for multidimensional data w...