• Citations Per Year
Learn More
Due to the advance of mobile network, E-commerce, Open Networks, and Internet Banking, Information Security Management System (ISMS) is used to manage information of their customer and themselves by a government or a business organization . The best known ISMSs are BS7799/ISO17799, Common Criteria, which are international standard. And some nations use(More)
In mobile communication environment, mutual authentication is very important. Lu <i>et al</i>. proposed an anonymous mutual authentication protocol with provable link-layer location privacy. In this paper, we identify a flaw in their design and demonstrate that the Lu <i>et al</i>. protocol is vulnerable to the QoS (Quality of Service) of a packet's(More)
Resolving rightful ownerships of digital images is an active research area of watermarking. Though a watermark is used to prove the owner’s ownership, an attacker can invalidate it by creating his fake original image and its corresponding watermark. This kind of attack is called ambiguity attack and can be tackled either by use of non-invertible(More)
  • 1