Sciweavers

8 search results - page 1 / 2
» isw 2000
Sort
View
ISW
2000
Springer
13 years 11 months ago
A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients
Generally, low frequency domain may be useful to embed a watermark in an image. However, if a watermark is embedded into low frequency components, blocking effects may occur in the...
Minoru Kuribayashi, Hatsukazu Tanaka
ISW
2000
Springer
13 years 11 months ago
Performance Analysis of Secure Web Server Based on SSL
Abstract. In recent years, protocols have been developed to ensure secure communications over the Internet, e.g., the secure sockets layer (SSL) and secure electronic transaction (...
Xiaodong Lin, Johnny W. Wong, Weidong Kou
ISW
2000
Springer
13 years 11 months ago
A Signcryption Scheme Based on Integer Factorization
Abstract. Signcryption is a public-key cryptographic primitive introduced by Zheng, which achieves both message confidentiality and nonrepudiatable origin authenticity, at a lower ...
Ron Steinfeld, Yuliang Zheng
ISW
2000
Springer
13 years 11 months ago
Weighted One-Way Hash Chain and Its Applications
An one-way hash chain generated by the iterative use of a one-way hash function on a secret value has recently been widely employed to develop many practical cryptographic solution...
Sung-Ming Yen, Yuliang Zheng
ISW
2000
Springer
13 years 11 months ago
Classification of Authentication Protocols: A Practical Approach
We propose a simple classification method for public-key based authentication protocols, which consists of identifying several basic properties leading to a large number of generic...
DongGook Park, Colin Boyd, Ed Dawson