Processing certificate of authorization with watermark in security

Tsang Yean Lee, Huey Ming Lee, Nai Wen Kuo, Ming Kao

研究成果: 書貢獻/報告類型會議貢獻

摘要

We propose the safe treatment of the certificate of authorization in this article. We insert the watermark in the certificate of authorization. Both of the owner and grantee keep the certificate of authorization. We encrypt the file of the certificate of authorization and watermark with different key to produce the file of cipher text. Both of the owner and grantee keep their files. When both sides want to confirm, we use their keys to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The step that the certificate of authorization is encrypted and decrypted will be safer.
原文英語
主出版物標題Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
頁面460-465
頁數6
2
DOIs
出版狀態已發佈 - 12月 29 2008
對外發佈
事件3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 - Busan, 韓國
持續時間: 11月 11 200811月 13 2008

出版系列

名字Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
2

會議

會議3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
國家/地區韓國
城市Busan
期間11/11/0811/13/08

ASJC Scopus subject areas

  • 資訊系統
  • 軟體

指紋

深入研究「Processing certificate of authorization with watermark in security」主題。共同形成了獨特的指紋。

引用此