Processing certificate of authorization with watermark in security

Tsang Yean Lee, Huey Ming Lee, Nai Wen Kuo, Ming Kao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We propose the safe treatment of the certificate of authorization in this article. We insert the watermark in the certificate of authorization. Both of the owner and grantee keep the certificate of authorization. We encrypt the file of the certificate of authorization and watermark with different key to produce the file of cipher text. Both of the owner and grantee keep their files. When both sides want to confirm, we use their keys to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The step that the certificate of authorization is encrypted and decrypted will be safer.

Original languageEnglish
Title of host publicationProceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
Pages460-465
Number of pages6
Volume2
DOIs
Publication statusPublished - Dec 29 2008
Externally publishedYes
Event3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 - Busan, Korea, Republic of
Duration: Nov 11 2008Nov 13 2008

Conference

Conference3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
CountryKorea, Republic of
CityBusan
Period11/11/0811/13/08

Fingerprint

Processing

ASJC Scopus subject areas

  • Information Systems
  • Software

Cite this

Lee, T. Y., Lee, H. M., Kuo, N. W., & Kao, M. (2008). Processing certificate of authorization with watermark in security. In Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 (Vol. 2, pp. 460-465). [4682284] https://doi.org/10.1109/ICCIT.2008.144

Processing certificate of authorization with watermark in security. / Lee, Tsang Yean; Lee, Huey Ming; Kuo, Nai Wen; Kao, Ming.

Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. Vol. 2 2008. p. 460-465 4682284.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, TY, Lee, HM, Kuo, NW & Kao, M 2008, Processing certificate of authorization with watermark in security. in Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. vol. 2, 4682284, pp. 460-465, 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008, Busan, Korea, Republic of, 11/11/08. https://doi.org/10.1109/ICCIT.2008.144
Lee TY, Lee HM, Kuo NW, Kao M. Processing certificate of authorization with watermark in security. In Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. Vol. 2. 2008. p. 460-465. 4682284 https://doi.org/10.1109/ICCIT.2008.144
Lee, Tsang Yean ; Lee, Huey Ming ; Kuo, Nai Wen ; Kao, Ming. / Processing certificate of authorization with watermark in security. Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. Vol. 2 2008. pp. 460-465
@inproceedings{104abfff33d9418e8681ac8379bc2419,
title = "Processing certificate of authorization with watermark in security",
abstract = "We propose the safe treatment of the certificate of authorization in this article. We insert the watermark in the certificate of authorization. Both of the owner and grantee keep the certificate of authorization. We encrypt the file of the certificate of authorization and watermark with different key to produce the file of cipher text. Both of the owner and grantee keep their files. When both sides want to confirm, we use their keys to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The step that the certificate of authorization is encrypted and decrypted will be safer.",
author = "Lee, {Tsang Yean} and Lee, {Huey Ming} and Kuo, {Nai Wen} and Ming Kao",
year = "2008",
month = "12",
day = "29",
doi = "10.1109/ICCIT.2008.144",
language = "English",
isbn = "9780769534077",
volume = "2",
pages = "460--465",
booktitle = "Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008",

}

TY - GEN

T1 - Processing certificate of authorization with watermark in security

AU - Lee, Tsang Yean

AU - Lee, Huey Ming

AU - Kuo, Nai Wen

AU - Kao, Ming

PY - 2008/12/29

Y1 - 2008/12/29

N2 - We propose the safe treatment of the certificate of authorization in this article. We insert the watermark in the certificate of authorization. Both of the owner and grantee keep the certificate of authorization. We encrypt the file of the certificate of authorization and watermark with different key to produce the file of cipher text. Both of the owner and grantee keep their files. When both sides want to confirm, we use their keys to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The step that the certificate of authorization is encrypted and decrypted will be safer.

AB - We propose the safe treatment of the certificate of authorization in this article. We insert the watermark in the certificate of authorization. Both of the owner and grantee keep the certificate of authorization. We encrypt the file of the certificate of authorization and watermark with different key to produce the file of cipher text. Both of the owner and grantee keep their files. When both sides want to confirm, we use their keys to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The step that the certificate of authorization is encrypted and decrypted will be safer.

UR - http://www.scopus.com/inward/record.url?scp=57849166246&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=57849166246&partnerID=8YFLogxK

U2 - 10.1109/ICCIT.2008.144

DO - 10.1109/ICCIT.2008.144

M3 - Conference contribution

SN - 9780769534077

VL - 2

SP - 460

EP - 465

BT - Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008

ER -