Processing certificate of authorization with watermark in security

Tsang Yean Lee, Huey Ming Lee, Nai Wen Kuo, Ming Kao

研究成果: 書貢獻/報告類型會議貢獻

摘要

We propose the safe treatment of the certificate of authorization in this article. We insert the watermark in the certificate of authorization. Both of the owner and grantee keep the certificate of authorization. We encrypt the file of the certificate of authorization and watermark with different key to produce the file of cipher text. Both of the owner and grantee keep their files. When both sides want to confirm, we use their keys to decrypt both files. If the certificate of authorization and watermark are the same, then they are correct. The step that the certificate of authorization is encrypted and decrypted will be safer.
原文英語
主出版物標題Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
頁面460-465
頁數6
2
DOIs
出版狀態已發佈 - 十二月 29 2008
對外發佈Yes
事件3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 - Busan, 大韓民國
持續時間: 十一月 11 2008十一月 13 2008

會議

會議3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
國家大韓民國
城市Busan
期間11/11/0811/13/08

ASJC Scopus subject areas

  • Information Systems
  • Software

引用此

Lee, T. Y., Lee, H. M., Kuo, N. W., & Kao, M. (2008). Processing certificate of authorization with watermark in security. 於 Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 (卷 2, 頁 460-465). [4682284] https://doi.org/10.1109/ICCIT.2008.144