Citation: | LI Xian-xian, HUAI Jin-peng. Undeniable Cryptographic Protocol for Both Sender and Receiver and Its Applications[J]. Journal of Beijing University of Aeronautics and Astronautics, 2001, 27(2): 182-185. (in Chinese) |
[1] Even S, Goldreich O, Lempel A. A randomizing protocol for signing contracts[J]. Communications of the ACM, 1985, 28(6):637~647. [2] Zhou J, Gollman D. A fair non-repudiation protocol. In:Roscheisen M, Serban C, eds. Proceeding of 1996 IEEE Symposium on Security and Privacy. Oakland:IEEE Computer Society Press, 1996. 55~61. [3] 卿斯汉,常晓林,章 江. 安全电子商务协议iKPI的设计和实现. 见:卿斯汉,冯登国编. 信息和通信安全——CCICS'99:第一届中国信息和通信安全学术会议论文集. 北京:科学出版社,2000.230~239. [4] Zimmermann P R. The official PGP user's guide[M]. Boston:MIT Press, 1995. [5] 王育民,刘建伟. 通信网的安全——理论与技术[M]. 西安:西安电子科技大学出版社, 1999.
|