期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Design and Implementation of Spatial Data Watermarking Service System
1
作者 WU Baiyan WANG Wei +2 位作者 PENG Zhiyong DU Daosheng WANG Chuanjian 《Geo-Spatial Information Science》 2010年第1期40-48,共9页
Nowadays, more and more digitalized spatial data are sold and transmitted on the Internet. Thus, there arises an important issue about copyright protection of the digital data. To solve this problem, this paper has de... Nowadays, more and more digitalized spatial data are sold and transmitted on the Internet. Thus, there arises an important issue about copyright protection of the digital data. To solve this problem, this paper has designed and implemented a spatial data watermarking service (SDWS) system which can provide a secure framework for data transaction and transfer via the Internet and protect the rights of both copyright owners and consumers at the same time. 展开更多
关键词 spatial data transaction digital watermarking watermarking protocol mobile agent digital signature
原文传递
Winternitz stack protocols for embedded systems and IoT
2
作者 Alex Shafarenko 《Cybersecurity》 2025年第2期115-131,共17页
This paper proposes and evaluates a new bipartite post-quantum digital signature protocol based on Winternitz chains and an oracle.Mutually mistrustful Alice and Bob are able to agree and sign a series of documents in... This paper proposes and evaluates a new bipartite post-quantum digital signature protocol based on Winternitz chains and an oracle.Mutually mistrustful Alice and Bob are able to agree and sign a series of documents in a way that makes it impossible(within the assumed security model)to repudiate their signatures.The number of signatures supported by a single public key is still limited,though by a large number.However,the security of the signature scheme is not diminished by repeated application,so when the capacity of a public key is exhausted the last transaction can be used to agree a new key.Some ramifications are discussed,security parameters evaluated and an application area delineated for the proposed concept. 展开更多
关键词 Signature protocol Hash-based signature Post-quantum
原文传递
Weak blind quantum signature protocol based on entanglement swapping
3
作者 Minghui Zhang Huifang Li 《Photonics Research》 SCIE EI 2015年第6期324-328,共5页
In this paper, we put forward a weak blind quantum signature scheme based on quantum entanglement swapping of Bell states. Different from the existing quantum signature schemes, our scheme can offer two-step verificat... In this paper, we put forward a weak blind quantum signature scheme based on quantum entanglement swapping of Bell states. Different from the existing quantum signature schemes, our scheme can offer two-step verification security services to ensure the validity of the verification. In order to guarantee the unconditional security of the scheme, the quantum key distribution protocol and one-time pad encryption algorithm are employed in our scheme. Besides, the entanglement swapping of Bell states mechanism enhances the security of verification criteria. The proposed scheme has the properties of nonforgeability, nonrepudiation, lindness,and traceability. 展开更多
关键词 BELL Weak blind quantum signature protocol based on entanglement swapping QKD
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部