dc.creatorPiva F.R.
dc.creatorMonteiro J.R.M.
dc.creatorDahab R.
dc.date2009
dc.date2015-06-26T13:34:44Z
dc.date2015-11-26T15:33:33Z
dc.date2015-06-26T13:34:44Z
dc.date2015-11-26T15:33:33Z
dc.date.accessioned2018-03-28T22:42:07Z
dc.date.available2018-03-28T22:42:07Z
dc.identifier9782953244311
dc.identifier2009 International Conference On Network And Service Security, N2s 2009. , v. , n. , p. - , 2009.
dc.identifier
dc.identifier
dc.identifierhttp://www.scopus.com/inward/record.url?eid=2-s2.0-70449652335&partnerID=40&md5=fabaae590377a96bc4d645d852addcf6
dc.identifierhttp://www.repositorio.unicamp.br/handle/REPOSIP/92055
dc.identifierhttp://repositorio.unicamp.br/jspui/handle/REPOSIP/92055
dc.identifier2-s2.0-70449652335
dc.identifier.urihttp://repositorioslatinoamericanos.uchile.cl/handle/2250/1262772
dc.descriptionIn this paper we discuss the often overlooked timeliness property of fair exchange protocols. We gather different available definitions of this property, and propose a new and stronger interpretation for timeliness in the context of security protocols. We discuss common timeliness-related pitfalls in fair exchange protocol design, and show a particular timeliness attack effective in several optimistic protocols proposed in the literature. Finally, we provide guidelines that may help to avoid common mistakes in protocol design, and propose our own protocol that ensures both fairness and timeliness. © 2009 ESRGroups France.
dc.description
dc.description
dc.description
dc.description
dc.descriptionAsokan, A., Fairness in electronic commerce, (1998), Ph.D. dissertation, University of WaterlooGärtner, F.C., Pagnia, H., Vogt, H., Approaching a formal definition of fairness in electronic commerce (1999) Symposium on Reliable Distributed Systems, pp. 354-359
dc.descriptionKremer, S., Markowitch, O., Zhou, J., An intensive survey of fair non-repudiation protocols (2002) Computer Communications, 25 (17), pp. 1606-1621
dc.descriptionLouridas, P., Some guidelines for non-repudiation protocols (2000) SIG-COMM Comput. Commun. Rev, 30 (5), pp. 29-38
dc.descriptionAbadi, M., Needham, R., Prudent engineering practice for cryptographic protocols (1996) IEEE Transactions on Software Engineering, 22 (1), pp. 6-15
dc.descriptionWoo, T.Y.C., Lam, S.S., A lesson on authentication protocol design (1994) Operating Systems Review, 28 (3), pp. 24-37. , citeseer.ist.psu.edu/woo94lesson.html, Online, Available
dc.descriptionMarkowitch, O., Roggeman, Y., Probabilistic non-repudiation without trusted third party (1999) Second Workshop on Security in Communication Network, 99. , citeseer.ist.psu.edu/markowitch99probabilistic.html, Online, Available
dc.descriptionPagnia, H., Vogt, H., Gaertner, F.C., Fair Exchange (2003) The Computer Journal, 46 (1), p. 55
dc.descriptionOnieva, J., Zhou, J., Lopez, J., Enhancing certified email service for timeliness and multicasting (2004) Proceedings of the Fourth International Network Conference, INC'04, pp. 327-335. , Steven M. Furnell and Paul S. Dowland Eds, 6-9 July, Plymouth, UK, Oct
dc.descriptionAnderson, R.J., Liability and computer security: Nine principles (1994) Springer LNCS, 94, pp. 231-245. , Computer Security, ESORICS, 875. SpringerVerlag
dc.descriptionPagnia, H., Gärtner, F.C., (1999) On the impossibility of fair exchange without a trusted third party, , citeseer.ist.psu.edu/pagnia99impossibility.html, Darmstadt, Germany, Tech. Rep. TUD-BS-1999-02, Online, Available
dc.descriptionPiva, F.R., Monteiro, J.R.M., Devegili, A.J., Dahab, R., Applying strand spaces to certified delivery proofs (2006) Anais do VI SBSeg, Simpósio Brasileiro em Segurança da Informaç ão e de Sistemas Com-putacionais, , UFRJ/NCE, September
dc.descriptionPiva, F.R., Monteiro, J.R.M., Dahab, R., Strand spaces and fair exchange: More on how to trace attacks and security problems (2007) Anais do VII SBSeg, Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, pp. 80-93. , UFRJ/NCE, September
dc.descriptionThayer, F.J., Herzog, J.C., Guttman, J.D., Strand spaces: Proving security protocols correct (1999) Journal of Computer Security, 7 (2-3), pp. 191-230
dc.descriptionMicali, S., Simple and fast optimistic protocols for fair electronic exchange (2003) PODC '03: Proceedings of the twenty-second annual symposium on Principles of distributed computing, pp. 12-19. , New York, NY, USA: ACM Press
dc.descriptionZhou, J., Deng, R.H., Bao, F., Evolution of fair non-repudiation with ttp (1999) ACISP '99: Proceedings of the 4th Australasian Conference on Information Security and Privacy, pp. 258-269. , London, UK: Springer-Verlag
dc.descriptionZuo, M., Li, J., Constructing fair-exchange p2p file market (2005) Proceedings of the 4th International Conference on Grid and Cooperative Computing, pp. 941-946. , Springer
dc.descriptionPayeras-Capellà, M., Ferrer-Gomila, J.L., Huguet-Rotger, L., Achieving fairness and timeliness in a previous electronic contract signing protocol (2006) ARES, pp. 717-722. , IEEE Computer Society
dc.descriptionBao, F., Wang, G., Zhou, J., Zhu, H., Analysis and improvement of Micali's fair contract signing protocol (2004) LNCS, 3108, pp. 176-187. , In: Information Security and Privacy ACISP'04, Springer-Verlag
dc.descriptionFerrer-Gomila, J.L., Payeras-Capellà, M., Rotger, L., An efficient protocol for certified electronic mail (2000) ser. Lecture Notes in Computer Science, 1975, pp. 237-248. , Third International Workshop-ISW 2000, Berlin: Springer-Verlag
dc.descriptionAnderson, R.J., Needham, R.M., Robustness principles for public key protocols (1995) CRYPTO '95: Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, pp. 236-247. , London, UK: Springer-Verlag
dc.descriptionAsokan, N., Shoup, V., Waidner, M., Optimistic fair exchange of digital signatures (1999) IEEE Journal on Selected Areas in Communications, 18 (4), pp. 593-610. , citeseer.ist.psu.edu/article/asokan98optimistic.html, Online, Available
dc.descriptionNenadic, A., Zhang, N., Barton, S.K., Fides: A middleware ecommerce security solution (2004) The 3rd European Conference on Information Warfare and Security, pp. 295-304. , Jun
dc.descriptionNenadic, A., Zhang, N., Barton, S.K., A security protocol for certified e-goods delivery (2004) Information Assurance and Security, pp. 22-28. , IEEE Computer Society, Apr
dc.descriptionGärtner, F., (2002) The problem of fair exchange, its formalization, and its relation to other problems in distributed computing, , citeseer.ist.psu.edu/717251.html, Online, Available
dc.languageen
dc.publisher
dc.relation2009 International Conference on Network and Service Security, N2S 2009
dc.rightsfechado
dc.sourceScopus
dc.titleRegarding Timeliness In The Context Of Fair Exchange
dc.typeActas de congresos


Este ítem pertenece a la siguiente institución