To search, Click below search items.
All Published Papers Search Service
Title
Synchronous Counterfeiting Attacks on self-embedding Watermarking Schemes
Author
Hongjie He, Jiashu Zhang, Hongxia Wang
Vol. 6 No. 1 pp. 251~257
Keywords
Self-embedding watermarking, Counterfeiting attacks, Vector quantization attack, the offset
Cryptanalysis of Sui et al.'s Second ID-based Key Issuing Protocol without Key Escrow
Hyunjue Kim, Seungjoo Kim, Dongho Won
Vol. 6 No. 1 pp. 247~250
ID-based cryptography, Key escrow problem, Secure key issuing
Cryptanalysis of Simplified Data Encryption Standard via Optimisation Heuristics¢Ó
Nalini N, G Raghavendra Rao
Vol. 6 No. 1 pp. 240~246
A Case Study in Applying IT Security Evaluation on Common Criteria to Development Process of MTOS 7.5
Shim ho Kim
Vol. 6 No. 1 pp. 234~239
IT security evaluation, Common Criteria, Development process, MTOS 7.5