Sciweavers

ISW
2000
Springer
13 years 8 months ago
Weighted One-Way Hash Chain and Its Applications
An one-way hash chain generated by the iterative use of a one-way hash function on a secret value has recently been widely employed to develop many practical cryptographic solution...
Sung-Ming Yen, Yuliang Zheng
ISW
2000
Springer
13 years 8 months ago
Classification of Authentication Protocols: A Practical Approach
We propose a simple classification method for public-key based authentication protocols, which consists of identifying several basic properties leading to a large number of generic...
DongGook Park, Colin Boyd, Ed Dawson
ISW
2000
Springer
13 years 8 months ago
A Signcryption Scheme Based on Integer Factorization
Abstract. Signcryption is a public-key cryptographic primitive introduced by Zheng, which achieves both message confidentiality and nonrepudiatable origin authenticity, at a lower ...
Ron Steinfeld, Yuliang Zheng
ISW
2000
Springer
13 years 8 months ago
Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling
Abstract. Two robust spatial-domain watermarking algorithms for image copyright protection are described in this paper. The first one is robust against compression, filtering and c...
Francesc Sebé, Josep Domingo-Ferrer, Jordi ...
ISW
2000
Springer
13 years 8 months ago
Performance Analysis of Secure Web Server Based on SSL
Abstract. In recent years, protocols have been developed to ensure secure communications over the Internet, e.g., the secure sockets layer (SSL) and secure electronic transaction (...
Xiaodong Lin, Johnny W. Wong, Weidong Kou
ISW
2000
Springer
13 years 8 months ago
A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients
Generally, low frequency domain may be useful to embed a watermark in an image. However, if a watermark is embedded into low frequency components, blocking effects may occur in the...
Minoru Kuribayashi, Hatsukazu Tanaka
ISW
2000
Springer
13 years 8 months ago
Towards a Practical Secure Framework for Mobile Code Commerce
Securing the mobile code commerce is not an easy task at all. We propose in this paper a framework to tackle this problem. In a first step, we analyse the general issues that must ...
Gaël Hachez, Laurent Den Hollander, Mehrdad J...