Search
for Author
All Reviews
Chang, Chin
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
4
of
4
reviews
Secure communications for cluster-based ad hoc networks using node identities
Lee J., Chang C. Journal of Network and Computer Applications 30(4): 1377-1396, 2007. Type: Article
One of the important challenges in ad hoc mobile networking is providing secure communication among participants. This paper proposes a protocol based on node identities (ID) to establish such a secure environment. The advantage of thi...
...
May 1 2008
Security enhancement for anonymous secure e-voting over a network
Lin I., Hwang M., Chang C. Computer Standards & Interfaces 25(2): 131-139, 2003. Type: Article
Mu and Varadharajan [1] have proposed two versions of an anonymous secure electronic voting scheme to be implemented over a network. These algorithms are based on the ElGamal digital signature algorithm. This paper considers the second...
...
Sep 30 2003
A new key assignment scheme for enforcing complicated access control policies in hierarchy
Lin I., Hwang M., Chang C. Future Generation Computer Systems 19(4): 457-462, 2003. Type: Article
Consider a computing system with resources partitioned into
m
disjoint categories,
C[1], C[2], ..., C[m]
, with access to each category
C[k]
being limited to those knowing a secre...
...
Aug 4 2003
Detection and restoration of tampered JPEG compressed images
Wu H., Chang C. Journal of Systems and Software 64(2): 151-161, 2002. Type: Article
A method for detecting and recovering tampered JPEG images is the subject of this paper. Similar to watermarking techniques, this approach embeds into the original image a code that only authorized users (by means of a private key) can...
...
May 29 2003
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy