Encyclopedia of Cryptography and Security

2011 Edition
| Editors: Henk C. A. van Tilborg, Sushil Jajodia

Certified Mail

  • Matthias Schunter
Reference work entry
DOI: https://doi.org/10.1007/978-1-4419-5906-5_183

Synonyms

Related Concepts

Definition

Certified mail is the  fair exchange of secret data for a receipt for this data.
This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    Asokan N, Shoup V, Waidner M (1998) Asynchronous protocols for optimistic fair exchange. 1998 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos, pp 86–99Google Scholar
  2. 2.
    Bao F, Deng R, Mao W (1998) Efficient and practical fair exchange protocols with off-line TTP. 1998 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos, pp 77–85Google Scholar
  3. 3.
    Blum M (1981) Three applications of the oblivious transfer, Version 2. Department of Electrical Engineering and Computer Sciences, University of California at Berkeley, Berkley, CAGoogle Scholar
  4. 4.
    ISO/IEC (1997) Information technology – security techniques – nonrepudiation. Part 1: general. ISO/IEC International Standart 13888-1 (1st edn)Google Scholar
  5. 5.
    Rabin MO (1981) Transaction protection by beacons. Technical Report TR-29-1, Aiken Computation Laboratory, Harvard University, Cambridge, MAGoogle Scholar
  6. 6.
    Rabin MO (1983) Transaction protection by beacons. J Comput Syst Sci 27:256–267MATHMathSciNetCrossRefGoogle Scholar
  7. 7.
    Zhou J, Gollmann D (1996) A fair non-repudiation protocol. In: Proceedings of 1996 IEEE Symposium on Security and Privacy, Oakland, CA, pp 55–61CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  • Matthias Schunter
    • 1
  1. 1.IBM Research-ZurichIBM Research-ZurichRüschlikonSwitzerland