메뉴 건너뛰기




Volumn 1, Issue , 2009, Pages 511-515

Combine elliptic curve cryptography with digital watermark for OWL-based ontology encryption

Author keywords

Digital watermark; Elliptic curve cryptography; Error correcting codes; OWL; Semantic web

Indexed keywords

DIGITAL WATER-MARKS; ELLIPTIC CURVE CRYPTOGRAPHY; ERROR CORRECTING CODE; ERROR-CORRECTING CODES; KEY SIZES; NOVEL METHODS; SECURITY PROTECTION;

EID: 77949295528     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIS.2009.99     Document Type: Conference Paper
Times cited : (4)

References (14)
  • 4
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Advances in cryptology, proceedings of CRYPTO'85, Springer-Verlag;
    • Miller VS, "Use of elliptic curves in cryptography", in Advances in cryptology, proceedings of CRYPTO'85, vol. 218. LNCS, Springer-Verlag; 1986. p. 417-426.
    • (1986) LNCS , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 5
    • 77949283623 scopus 로고    scopus 로고
    • Koblitz N. Elliptic curve cryptosystem, Mathematics of Computa-tion, (48), pp. 203-209,1987.
    • Koblitz N. "Elliptic curve cryptosystem", Mathematics of Computa-tion, (48), pp. 203-209,1987.
  • 6
    • 11244267013 scopus 로고    scopus 로고
    • Guide to elliptic curve cryptog-raphy
    • New York, USA:, Springer-Verlag
    • Hankerson D, Menezes A, Vanstone S, Guide to elliptic curve cryptog-raphy, New York, USA: LNCS, Springer-Verlag, 2004.
    • (2004) LNCS
    • Hankerson, D.1    Menezes, A.2    Vanstone, S.3
  • 7
    • 77949287596 scopus 로고    scopus 로고
    • ECC holds key to next-gen cryptography, Online, Available
    • ECC holds key to next-gen cryptography. [Online]. Available: http://www.design-reuse.com/articles/7409/ecc-holds-key-to-next-gen- cryptography.html
  • 8
    • 70449347307 scopus 로고    scopus 로고
    • Techniques for OWL-based Ontology Watermarking
    • May, DOI 10.1109/GCIS.2009.149
    • Hongbin Kong, Gang Xue, Kebin Tian, Shaowen Yao. "Techniques for OWL-based Ontology Watermarking", in Proc. GCIS'09, May, 2009, vol. IV , p. 582-586, DOI 10.1109/GCIS.2009.149.
    • (2009) Proc. GCIS'09 , vol.4 , pp. 582-586
    • Kong, H.1    Xue, G.2    Tian, K.3    Yao, S.4
  • 9
    • 70449342528 scopus 로고    scopus 로고
    • Home Page. Available
    • The SNOW Home Page. Available: http://www.darkside.com.au/snow/
    • The SNOW
  • 10
    • 77949285879 scopus 로고    scopus 로고
    • The wikipedia website. Available
    • The wikipedia website. Available: http://en.wikipedia.org/wiki/Error- detection-and-correction#Error-correcting-code
  • 12
    • 63049116480 scopus 로고    scopus 로고
    • An Id-based remote mutual authen-tication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    • Jen-Ho Yang, Chin-Chen Chang, "An Id-based remote mutual authen-tication with key agreement scheme for mobile devices on elliptic curve cryptosystem", Computers & security,28(2009), pp.138-143.
    • (2009) Computers & security , vol.28 , pp. 138-143
    • Yang, J.-H.1    Chang, C.-C.2
  • 13


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.