Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
The "anytime, anywhere" concept of human-oriented ubiquitous computing and communication environment (UE) provides an avenue for people to access to everyday devices with some built-in intelligent feature. This allows for them to conveniently access to vast amounts of information including...
| Main Authors: | Goi, Bok Min, Phan, Raphael Chung Wei, Chuah, Hean Teik |
|---|---|
| Format: | Book Section |
| Published: |
Springer
2007
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/3196/ |
Similar Items
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
by: Phan, Raphael C.-W., et al.
Published: (2008)
by: Phan, Raphael C.-W., et al.
Published: (2008)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration
by: Phan, Raphael Chung Wei
Published: (2005)
by: Phan, Raphael Chung Wei
Published: (2005)
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)
by: Yap, Wun-She, et al.
Published: (2007)
A fragile watermarking scheme protecting originator's rights for multimedia service
by: Ting, Grace C. -W., et al.
Published: (2007)
by: Ting, Grace C. -W., et al.
Published: (2007)
Rights and remedies of the buyers and the sellers
by: Mohamad, Nor Asiah
Published: (2011)
by: Mohamad, Nor Asiah
Published: (2011)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Cryptanalysis Of The Advanced Encription Standard & Skip Jack
by: Phan, Raphael Chung We
Published: (2002)
by: Phan, Raphael Chung We
Published: (2002)
Cryptanalysis Of The Advanced Encription Standard & Skip Jack
by: Phan, Raphael Chung Wei
Published: (2002)
by: Phan, Raphael Chung Wei
Published: (2002)
Cryptanalysis of PASS II and MiniPass
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Emergence and Evolvement of Buyer Seller Relationships in Supply Chain
by: Khandelwal, Srishti
Published: (2013)
by: Khandelwal, Srishti
Published: (2013)
Flaws in generic watermarking protocols based on zero-knowledge proofs
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Modelling buyer-seller relationships in agribusiness in South East Asia
by: Batt, Peter
Published: (2000)
by: Batt, Peter
Published: (2000)
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
The value of trading relationships between buyers and sellers of wine grapes in Australia
by: Hobley, Lynlee Ellen
Published: (2007)
by: Hobley, Lynlee Ellen
Published: (2007)
Exploring the nature of buyer-seller relationships in the Western Australian wine industry
by: Batt, Peter, et al.
Published: (2000)
by: Batt, Peter, et al.
Published: (2000)
A framework for describing block cipher cryptanalysis
by: Phan, Raphael C. W., et al.
Published: (2006)
by: Phan, Raphael C. W., et al.
Published: (2006)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
Salesperson Behaviour and Buyer-Seller Relationship Characteristics: An Analysis of Its Impact On Buyer Loyalty in the Malaysian Pharmaceutical Industry
by: Cheah, Chor Eng
Published: (2003)
by: Cheah, Chor Eng
Published: (2003)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
An explanatory study of motivation for maintaining buyer-seller relationships in the presence of the holdup problem
by: Yap, Derek Tzse Ming
Published: (2011)
by: Yap, Derek Tzse Ming
Published: (2011)
Trust: a determinant or the consequence of a long-term buyer-seller relationship.
by: Batt, Peter
Published: (2000)
by: Batt, Peter
Published: (2000)
Exploring buyer-seller relationships in developing countries: Empirical evidence from the Philippines
by: Batt, Peter, et al.
Published: (1999)
by: Batt, Peter, et al.
Published: (1999)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
Cryptanalysis using biological inspired computing approaches
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Computational complexity and implementation aspects of the incremental hash function
by: Goi, Bok Min, et al.
Published: (2003)
by: Goi, Bok Min, et al.
Published: (2003)
Exploring the nature of long-term buyer-seller relationships in the Western Australian wine industry
by: Batt, Peter
Published: (2001)
by: Batt, Peter
Published: (2001)
QSCILLOSCOPE: A PC-Based Real Time Oscilloscope
by: Yiqi, Tew, et al.
Published: (2008)
by: Yiqi, Tew, et al.
Published: (2008)
QSCILLOSCOPE: A PC-Based Real Time Oscilloscope
by: Yiqi, Tew, et al.
Published: (2008)
by: Yiqi, Tew, et al.
Published: (2008)
Internet anonymity practices in computer crime
by: Armstrong, Helen, et al.
Published: (2003)
by: Armstrong, Helen, et al.
Published: (2003)
The worth of anonymous feedback
by: Dreher, Heinz, et al.
Published: (2006)
by: Dreher, Heinz, et al.
Published: (2006)
An integrated inventory models under cooperative and non-cooperative seller-buyer and vendor supply chain
by: Shahrjerdi, Reza, et al.
Published: (2011)
by: Shahrjerdi, Reza, et al.
Published: (2011)
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
A Hybrid Method For K-Anonymization Using Clustering Technique
by: Abd.Rahim, Y, et al.
Published: (2011)
by: Abd.Rahim, Y, et al.
Published: (2011)
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020)
by: Thamer, Khalil Esmeel
Published: (2020)
Similar Items
-
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004) -
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005) -
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
by: Phan, Raphael C.-W., et al.
Published: (2008) -
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006) -
Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration
by: Phan, Raphael Chung Wei
Published: (2005)