Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
In this paper, we analyze the security of a generalized anonymous buyer-seller watermarking protocol recently proposed by Choi and Park at IWDW 2004. We prove that it has not met the designers' intended security criteria by showing that an attacker can actually: (1) discover the unique buyer...
| Main Authors: | Goi, , BM, Phan, , RCW, Siddiqi,, MU |
|---|---|
| Format: | Article |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2270/ |
Similar Items
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)
by: Goi, Bok Min, et al.
Published: (2007)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Cryptanalysis of PASS II and MiniPass
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Flaws in generic watermarking protocols based on zero-knowledge proofs
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
by: Phan, Raphael C.-W., et al.
Published: (2008)
by: Phan, Raphael C.-W., et al.
Published: (2008)
On the security bounds of CMC, EME, EME(+) and EME* - Modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration
by: Phan, Raphael Chung Wei
Published: (2005)
by: Phan, Raphael Chung Wei
Published: (2005)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Rights and remedies of the buyers and the sellers
by: Mohamad, Nor Asiah
Published: (2011)
by: Mohamad, Nor Asiah
Published: (2011)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
Emergence and Evolvement of Buyer Seller Relationships in Supply Chain
by: Khandelwal, Srishti
Published: (2013)
by: Khandelwal, Srishti
Published: (2013)
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)
by: Yap, Wun-She, et al.
Published: (2007)
Modelling buyer-seller relationships in agribusiness in South East Asia
by: Batt, Peter
Published: (2000)
by: Batt, Peter
Published: (2000)
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
A framework for describing block cipher cryptanalysis
by: Phan, Raphael C. W., et al.
Published: (2006)
by: Phan, Raphael C. W., et al.
Published: (2006)
The value of trading relationships between buyers and sellers of wine grapes in Australia
by: Hobley, Lynlee Ellen
Published: (2007)
by: Hobley, Lynlee Ellen
Published: (2007)
Exploring the nature of buyer-seller relationships in the Western Australian wine industry
by: Batt, Peter, et al.
Published: (2000)
by: Batt, Peter, et al.
Published: (2000)
Salesperson Behaviour and Buyer-Seller Relationship Characteristics: An Analysis of Its Impact On Buyer Loyalty in the Malaysian Pharmaceutical Industry
by: Cheah, Chor Eng
Published: (2003)
by: Cheah, Chor Eng
Published: (2003)
An explanatory study of motivation for maintaining buyer-seller relationships in the presence of the holdup problem
by: Yap, Derek Tzse Ming
Published: (2011)
by: Yap, Derek Tzse Ming
Published: (2011)
Trust: a determinant or the consequence of a long-term buyer-seller relationship.
by: Batt, Peter
Published: (2000)
by: Batt, Peter
Published: (2000)
Exploring buyer-seller relationships in developing countries: Empirical evidence from the Philippines
by: Batt, Peter, et al.
Published: (1999)
by: Batt, Peter, et al.
Published: (1999)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
Cryptanalysis using biological inspired computing approaches
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
Exploring the nature of long-term buyer-seller relationships in the Western Australian wine industry
by: Batt, Peter
Published: (2001)
by: Batt, Peter
Published: (2001)
Internet anonymity practices in computer crime
by: Armstrong, Helen, et al.
Published: (2003)
by: Armstrong, Helen, et al.
Published: (2003)
The worth of anonymous feedback
by: Dreher, Heinz, et al.
Published: (2006)
by: Dreher, Heinz, et al.
Published: (2006)
An integrated inventory models under cooperative and non-cooperative seller-buyer and vendor supply chain
by: Shahrjerdi, Reza, et al.
Published: (2011)
by: Shahrjerdi, Reza, et al.
Published: (2011)
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
A Hybrid Method For K-Anonymization Using Clustering Technique
by: Abd.Rahim, Y, et al.
Published: (2011)
by: Abd.Rahim, Y, et al.
Published: (2011)
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020)
by: Thamer, Khalil Esmeel
Published: (2020)
Trust Me! Trust You? The Indicators of Trust on buyer-seller relationships: Pre-and-Post COVID-19
by: van der Nest, nicolas, et al.
Published: (2024)
by: van der Nest, nicolas, et al.
Published: (2024)
Trust me! Trust you? The indicators of trust on buyer-seller relationships: pre-and-post COVID-19
by: Van Der Nest, Nicolas, et al.
Published: (2024)
by: Van Der Nest, Nicolas, et al.
Published: (2024)
The Management Of Conflict In Buyer-Seller
Relationships: A Case Study Of An Australian
Exporter In Asian And Us Markets
by: Freeman, Susan
Published: (2003)
by: Freeman, Susan
Published: (2003)
Attacks on a robust watermarking scheme based on self-reference image
by: TING, G, et al.
Published: (2008)
by: TING, G, et al.
Published: (2008)
Towards a Privacy Diagnosis Centre : Measuring k-anonymity
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
Cryptanalysis Of The Advanced Encription Standard & Skip Jack
by: Phan, Raphael Chung We
Published: (2002)
by: Phan, Raphael Chung We
Published: (2002)
Similar Items
-
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004) -
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007) -
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005) -
Cryptanalysis of PASS II and MiniPass
by: Goi, , BM, et al.
Published: (2005) -
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)