Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
By combining techniques of watermarking and fingerprinting, a sound buyer-seller watermarking protocol can address the issue of copyright protection in e-commerce. In this paper, we analyze the security of two recent anonymous buyer-seller watermarking protocols proposed by Ju et. at and Choi et. at...
| Main Authors: | Goi, , BM, Siddiqi, , MU, Deng, , RH, Bao,, F, Yang, , YJ, Phan, , RCW |
|---|---|
| Format: | Article |
| Published: |
2004
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2500/ |
Similar Items
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)
by: Goi, Bok Min, et al.
Published: (2007)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Cryptanalysis of PASS II and MiniPass
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
The worth of anonymous feedback
by: Dreher, Heinz, et al.
Published: (2006)
by: Dreher, Heinz, et al.
Published: (2006)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Internet anonymity practices in computer crime
by: Armstrong, Helen, et al.
Published: (2003)
by: Armstrong, Helen, et al.
Published: (2003)
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Anonymous feedback in e-learning systems
by: Dreher, Heinz
Published: (2005)
by: Dreher, Heinz
Published: (2005)
A Hybrid Method For K-Anonymization Using Clustering Technique
by: Abd.Rahim, Y, et al.
Published: (2011)
by: Abd.Rahim, Y, et al.
Published: (2011)
Flaws in generic watermarking protocols based on zero-knowledge proofs
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Towards a Privacy Diagnosis Centre : Measuring k-anonymity
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020)
by: Thamer, Khalil Esmeel
Published: (2020)
Anonymous: a social movement
by: Knight, William
Published: (2018)
by: Knight, William
Published: (2018)
A conceptual anonymity model to ensure privacy for sensitive network data
by: Arafat, N.H.M., et al.
Published: (2021)
by: Arafat, N.H.M., et al.
Published: (2021)
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
by: Phan, Raphael C.-W., et al.
Published: (2008)
by: Phan, Raphael C.-W., et al.
Published: (2008)
On the security bounds of CMC, EME, EME(+) and EME* - Modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
Enhanced slicing-based anonymization approach for privacy-preserving data publishing with improved data utility
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
"I'd be so much more comfortable posting anonymously": Identified versus anonymous participation in student discussion boards
by: Roberts, Lynne, et al.
Published: (2013)
by: Roberts, Lynne, et al.
Published: (2013)
Anonymous mutual authentication protocol for RFID tag without back-end database
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
The introduction of broker anonymity on the New Zealand Exchange
by: Poskitt, Russell, et al.
Published: (2011)
by: Poskitt, Russell, et al.
Published: (2011)
Get rid of yourself: toward an aesthetics of anonymity
by: Eckersley, David
Published: (2019)
by: Eckersley, David
Published: (2019)
A tracable proactive anonymous electronic cash
by: Chang, Yu Cheng, et al.
Published: (2000)
by: Chang, Yu Cheng, et al.
Published: (2000)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Rights and remedies of the buyers and the sellers
by: Mohamad, Nor Asiah
Published: (2011)
by: Mohamad, Nor Asiah
Published: (2011)
Collaborative healthcare information systems in privacy preservation based on K-anonymization model / Asmaa Hatem Rashid
by: Rashid, Asmaa Hatem
Published: (2014)
by: Rashid, Asmaa Hatem
Published: (2014)
Notions of anonymous existence in Martin-Löf type theory
by: Kraus, Nicolai, et al.
Published: (2016)
by: Kraus, Nicolai, et al.
Published: (2016)
Student evaluation surveys: anonymous comments that offend or are unprofessional
by: Tucker, Beatrice
Published: (2014)
by: Tucker, Beatrice
Published: (2014)
Increasing Data Anonymity using AES and Privacy Technique
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
A secure, anonymous and verifiable E-Voting system
by: Ooi, Elynn
Published: (2020)
by: Ooi, Elynn
Published: (2020)
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
by: Khalid, Haqi, et al.
Published: (2023)
by: Khalid, Haqi, et al.
Published: (2023)
UTMGO : a tool for searching a group of semantically related gene ontology terms and application to annotation of anonymous protein sequence
by: Deris, Safaai, et al.
Published: (2006)
by: Deris, Safaai, et al.
Published: (2006)
The removal of donor anonymity in the UK: the silencing of claims by would-be parents
by: Turkmendag Brunsnes, Ilke
Published: (2009)
by: Turkmendag Brunsnes, Ilke
Published: (2009)
A comparison of clustering algorithms for data anonymization / Zahra Mahmoud
by: Zahra, Mahmoud
Published: (2019)
by: Zahra, Mahmoud
Published: (2019)
Adaptive method to improve web recommendation system for anonymous users
by: Almurtadha, Yahya Mohammed
Published: (2011)
by: Almurtadha, Yahya Mohammed
Published: (2011)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
Securing anonymous authenticated announcement protocol for group signature in internet of vehicle / Nur Afiqah Suzelan Amir
by: Nur Afiqah , Suzelan Amir
Published: (2021)
by: Nur Afiqah , Suzelan Amir
Published: (2021)
AdaptAnon: adaptive anonymity for service queries in mobile opportunistic networks
by: Radenkovic, Milena, et al.
Published: (2013)
by: Radenkovic, Milena, et al.
Published: (2013)
Similar Items
-
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005) -
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007) -
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005) -
Cryptanalysis of PASS II and MiniPass
by: Goi, , BM, et al.
Published: (2005) -
The worth of anonymous feedback
by: Dreher, Heinz, et al.
Published: (2006)