A Non-Repudiation E-Mail Transmission Protocol and its Formal Analysis

Abstract:

Article Preview

In order to reduce the amount of data exchange in E-mail transmission process, a non-repudiation E-mail transmission protocol was proposed based on the digital signature technology. By using the formal analysis based on the extended strand space method, strict authentication and analysis were conducted for the security of data transmission and the identity of both the transmitter and receiver. Furthermore, the safety and effectiveness of this protocol were verified.

Info:

Periodical:

Edited by:

Keon Myung Lee, Prasad Yarlagadda and Yang-Ming Lu

Pages:

984-988

Citation:

Z. M. Ren et al., "A Non-Repudiation E-Mail Transmission Protocol and its Formal Analysis", Applied Mechanics and Materials, Vols. 462-463, pp. 984-988, 2014

Online since:

November 2013

Export:

Price:

$38.00

* - Corresponding Author

[1] D. Dolev, A. Yao: Technical Report ( No. STAN-CS-81-854, Dept. of Computer Science, Stanford University, May, 1981).

[2] Jiafen Liu, in: Research on Authentication Test Theory in Formal Analysis of Security Protocols (University of Electronic Science and Technology of China, Chengdu, 2008).

[3] Thayer F, Herzog J, Guttmann J, in: Proceedings of the 1998 IEEE Symposium on Security and Privacy, (1998), pp.160-171.

[4] Thayer F, Herzog J, Guttmann J, in: Proceedings of the 11th IEEE computer security Foundations Workshop (IEEE Computer Society Press, June 1998).

[5] Joshua D, Guttmann J, Thayer F, in: Proceedings of the 2000 IEEE Symposium on Security and Privacy (IEEE Computer Society Press, 2000, pp.96-109).

[6] Even S, Goldreich O, Lempel A: Communications of the ACM, Vol. 28(1985), pp.637-647 (In Chinese).

[7] Sihan Qing: Journal of Software, Vol. 11(2000), pp.1338-1343 (In Chinese).

[8] Yong-quan Cai, Zhu Yong: Research of Computer Application, Vol. 24(2007), pp.222-245 (In Chinese).

Fetching data from Crossref.
This may take some time to load.