Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Chang, Chin Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 4 of 4 reviews    
  Secure communications for cluster-based ad hoc networks using node identities
Lee J., Chang C. Journal of Network and Computer Applications 30(4): 1377-1396, 2007.  Type: Article

One of the important challenges in ad hoc mobile networking is providing secure communication among participants. This paper proposes a protocol based on node identities (ID) to establish such a secure environment. The advantage of thi...
...
May 1 2008  
  Security enhancement for anonymous secure e-voting over a network
Lin I., Hwang M., Chang C. Computer Standards & Interfaces 25(2): 131-139, 2003.  Type: Article

Mu and Varadharajan [1] have proposed two versions of an anonymous secure electronic voting scheme to be implemented over a network. These algorithms are based on the ElGamal digital signature algorithm. This paper considers the second...
...
Sep 30 2003  
  A new key assignment scheme for enforcing complicated access control policies in hierarchy
Lin I., Hwang M., Chang C. Future Generation Computer Systems 19(4): 457-462, 2003.  Type: Article

Consider a computing system with resources partitioned into m disjoint categories, C[1], C[2], ..., C[m], with access to each category C[k] being limited to those knowing a secre...
...
Aug 4 2003  
  Detection and restoration of tampered JPEG compressed images
Wu H., Chang C. Journal of Systems and Software 64(2): 151-161, 2002.  Type: Article

A method for detecting and recovering tampered JPEG images is the subject of this paper. Similar to watermarking techniques, this approach embeds into the original image a code that only authorized users (by means of a private key) can...
...
May 29 2003  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy