Many eligibility or entitlement certificates in every day life are non-transferable between persons. However, they are usually implemented by personal physical tokens that owners c...
We deal with two claws of Zhou-Gollmann's fair nonrepudiation protocol. Firstly, their protocol divides a message into 2 parts, i.e., a key K and a ciphertext C. Then, C is d...
We have developed a prototype electronic notary system (CYNOS : CYber NOtary System). CYNOS proves facts by providing the evidence (notary token) of events and/or actions that cou...
The Common Data Security Architecture (CDSA) from the Open Group is a flexible standard that defines APIs for security services needed for implementing Public Key Infrastructure (...