Definitions
from Wiktionary, Creative Commons Attribution/Share-Alike License.
- noun law Assurance that a contract cannot later be denied by either of the parties involved.
- noun telecommunications Assurance that the claimed sender or recipient is in fact the party who sent or received a given message.
Etymologies
from Wiktionary, Creative Commons Attribution/Share-Alike License
Support
Help support Wordnik (and make this page ad-free) by adopting the word nonrepudiation.
Examples
-
The chips can be used to support data protection, communications security, strong authentication, identity management, network access control and nonrepudiation.
-
The chips can be used to support data protection, communications security, strong authentication, identity management, network access control and nonrepudiation.
-
The chips can be used to support data protection, communications security, strong authentication, identity management, network access control and nonrepudiation.
-
The chips can be used to support data protection, communications security, strong authentication, identity management, network access control and nonrepudiation.
-
The chips can be used to support data protection, communications security, strong authentication, identity management, network access control and nonrepudiation.
-
The chips can be used to support data protection, communications security, strong authentication, identity management, network access control and nonrepudiation.
-
In commercial applications, nonrepudiation mechanisms give a chance to avoid classic comments such as "the check is in the mail" or "we haven't received your payment."
Citizendium, the Citizens' Compendium - Recent changes [en] 2009
-
There are technical nuances to nonrepudiation in communications systems.
Citizendium, the Citizens' Compendium - Recent changes [en] 2009
-
Digital signatures provide authentication, nonrepudiation, and data integrity, encryption of the traffic keeps the message contents confidential.
TechNet Blogs 2008
-
Digital signatures provide authentication, nonrepudiation, and data integrity, encryption of the traffic keeps the message contents confidential.
TechNet Blogs 2008
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.