Abstract
No abstract available.
RFC Downloads
ZIP
Cited By
- Rahnama B, Elci A and Celik S Securing RFID-based authentication systems using ParseKey+ Proceedings of the 3rd international conference on Security of information and networks, (212-217)
- Chang Y, Chang C and Kuo J (2004). A secure one-time password authentication scheme using smart cards without limiting login times, ACM SIGOPS Operating Systems Review, 38:4, (80-90), Online publication date: 1-Oct-2004.
- Lin M and Chang C (2004). A secure one-time password authentication scheme with low-computation for mobile communications, ACM SIGOPS Operating Systems Review, 38:2, (76-84), Online publication date: 1-Apr-2004.
- Curtin M Shibboleth Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (20-20)
- Grubb M and Carter R Single Sign-On and the System Administrator Proceedings of the 12th USENIX conference on System administration, (63-86)
- Mittra S Iolus Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication, (277-288)
- Mittra S (2019). Iolus, ACM SIGCOMM Computer Communication Review, 27:4, (277-288), Online publication date: 1-Oct-1997.
Recommendations
A watermarking-based image ownership and tampering authentication scheme
Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is ...
Multipurpose watermarking for image authentication and protection
We propose a novel multipurpose watermarking scheme, in which robust and fragile watermarks are simultaneously embedded, for copyright protection and content authentication. By quantizing a host image's wavelet coefficients as masking threshold units (...