Abuse-freeness in contract signing: a blockchain-based proposal

JL Ferrer-Gomila, MF Hinarejos - International Journal of Information …, 2024 - Springer
Electronic contract signing requires the design of protocols that guarantee that the exchange
is fair. In the past 5 years, we have observed that trusted third parties (TTPs) can be replaced …

A fair multi-party non-repudiation scheme for storage clouds

J Feng, Y Chen, DH Summerville - … International Conference on …, 2011 - ieeexplore.ieee.org
Data storage is one of the most profitable applications in Clouds. Although a transparent
service model is convenient, it may be subject to the loss of data integrity. Our study …

Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things

MR Abdmeziem, D Tandjaoui… - International Journal of …, 2018 - inderscienceonline.com
To secure e-health communications, key management protocols play a vital role in the
security process. Nevertheless, current e-health systems are unable to run existing …

[PDF][PDF] Data confidentiality in the Internet of Things

MR Abdmeziem - 2016 - researchgate.net
Abstract Internet of Things (IoT) paradigm makes billions of our everyday life objects part of
the Internet. This interconnection generates a huge amount of private data, which needs to …

Designing log architectures for legal evidence

D Le Métayer, E Mazza, ML Potet - 2010 8th IEEE International …, 2010 - ieeexplore.ieee.org
Establishing contractual liabilities in case of litigation is generally a delicate matter. It
becomes even more challenging when IT systems are involved. At the core of the problem …

A mobile network operator-independent mobile signature service

A Ruiz-Martínez, J Sánchez-Montesinos… - Journal of Network and …, 2011 - Elsevier
Electronic signature (e-signature) is an important element in electronic commerce and
government applications because it guarantees non-repudiation of transactions. E …

Securing IoT-based groups: Efficient, scalable and fault-tolerant key management protocol

MR Abdmeziem, F Charoy - Ad Hoc & Sensor Wireless Networks, 2019 - hal.science
Group key management protocols are crucial in establishing secured communication
channels for collaborative IoT-based groups. The Internet of Things (IoT) dimension includes …

A cross-layer SSO solution for federating access to kerberized services in the eduroam/DAMe network

A Pérez-Méndez, F Pereñíguez-García… - International Journal of …, 2012 - Springer
Eduroam has become one of the main examples of network federations around the world,
where hundred of institutions allow roaming end users to access the local network if they …

Fair Non-repudiation Framework for Cloud Storage: Part I

J Feng, Y Chen, DH Summerville, K Hwang - Cloud computing for …, 2011 - Springer
Data storage is one of the most profitable applications on the cloud computing platforms.
Although a transparent service model provides more flexibility and convenience, it also …

A fair non-repudiation framework for data integrity in cloud storage services

J Feng, Y Chen - International Journal of Cloud Computing, 2013 - inderscienceonline.com
Data storage is one of the most profitable applications on the cloud computing platforms.
Although a transparent service model provides more flexibility and convenience, it may be …