Processing certificate of authorization with watermark in security

Tsang Yean Lee, Huey Ming Lee, Nai Wen Kuo, Ming Kao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We propose the safe treatment of the certificate of authorization in this article. We insert the watermark in the certificate of authorization. Both of the owner and grantee keep the certificate of authorization. We encrypt the file of the certificate of authorization and watermark with different key to produce the file of cipher text. Both of the owner and grantee keep their files. When both sides want to confirm, we use their keys to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The step that the certificate of authorization is encrypted and decrypted will be safer.

Original languageEnglish
Title of host publicationProceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
Pages460-465
Number of pages6
Volume2
DOIs
Publication statusPublished - Dec 29 2008
Externally publishedYes
Event3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 - Busan, Korea, Republic of
Duration: Nov 11 2008Nov 13 2008

Publication series

NameProceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
Volume2

Conference

Conference3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
Country/TerritoryKorea, Republic of
CityBusan
Period11/11/0811/13/08

ASJC Scopus subject areas

  • Information Systems
  • Software

Fingerprint

Dive into the research topics of 'Processing certificate of authorization with watermark in security'. Together they form a unique fingerprint.

Cite this