Changjie Wang

Learn More
Analysis by Forrester research revealed that 18% of global exports will flow online in 2004 and that the volume of e-commerce will surpass $400 billion. Digital rights protection is a major issue in the e-commerce of multimedia contents. Watermarking technology has been proposed as a promising enabling technology for the rights protection of multimedia(More)
Electronic auctions have become an integral part of Electronic Commerce nowadays. Besides the popular single-sided auction protocols, i.e. English auction, Vickrey auction etc., Continuous Double Auction (CDA) is an important auction protocol that permits multiple buyers and sellers to trade goods. Internet CDAs have been widely used in financial and(More)
In this paper, we propose an implementation of secure watermarking protocol using cryptographic technologies for use in real-life Internet retail market of digital contents, in which there is no trust assumption between a customer and a digital content provider. The blind RSA decryption algorithm is used in our scheme to doubly lock the information by the(More)
A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper, a new secure anonymous mobile agent scheme is proposed for the prevention of agent tempering without compromising the mobility or autonomy of the agent. In the scheme, a mobile agent can produce valid signature on website's bid(More)
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. Various secure voting schemes have been proposed in the past several years to ensure the safe operation of electronic voting and most of them have focused on the common <i>"one(More)
Extensive studies have been made on electronic voting in the last twenty years, and many schemes have been proposed, in which both security and effectiveness have been improved. However, most available secure vote schemes mainly focused on the simple "one man, one vote" plurality protocol. In this paper, we address the security issues of the Borda voting(More)