摘要
We propose the safe treatment of the certificate of authorization in this article. We insert the watermark in the certificate of authorization. Both of the owner and grantee keep the certificate of authorization. We encrypt the file of the certificate of authorization and watermark with different key to produce the file of cipher text. Both of the owner and grantee keep their files. When both sides want to confirm, we use their keys to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The step that the certificate of authorization is encrypted and decrypted will be safer.
原文 | 英語 |
---|---|
主出版物標題 | Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 |
頁面 | 460-465 |
頁數 | 6 |
卷 | 2 |
DOIs | |
出版狀態 | 已發佈 - 12月 29 2008 |
對外發佈 | 是 |
事件 | 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 - Busan, 大韓民國 持續時間: 11月 11 2008 → 11月 13 2008 |
會議
會議 | 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 |
---|---|
國家/地區 | 大韓民國 |
城市 | Busan |
期間 | 11/11/08 → 11/13/08 |
ASJC Scopus subject areas
- 資訊系統
- 軟體