A Survey of Different Contract Signing Protocols

Download Now
Provided by: International Journal of Emerging Technology and Advanced Engineering (IJETAE)
Topic: Security
Format: PDF
Today in the field of security there are various protocols and authentication techniques that make an application in the network more secure and free from various attacks in the network. There are various applications which require exchange of data between parties. A fair exchange is required since the chances of attacks have been greatly increased. Hence a new protocol has been implemented for the fair exchange of data between parties called contract signing protocol. Here in this paper a survey of the entire contract signing protocols that are implemented are given.
Download Now

Find By Topic