Full metadata record
DC FieldValueLanguage
dc.contributor.authorLiu, Tsung-Yuanen_US
dc.contributor.authorTsai, Wen-Hsiangen_US
dc.date.accessioned2014-12-08T15:38:26Z-
dc.date.available2014-12-08T15:38:26Z-
dc.date.issued2010-12-01en_US
dc.identifier.issn1556-6013en_US
dc.identifier.urihttp://dx.doi.org/10.1109/TIFS.2010.2072501en_US
dc.identifier.urihttp://hdl.handle.net/11536/26314-
dc.description.abstractA new approach to efficient authentication of quotations from trusted sources but embedded in messages created by unknown authors is proposed. Two different techniques for efficient generation of authenticable quotations using cascaded hashing are proposed for conventional quotations, and an efficient two-dimensional signature generation technique is proposed for two-dimensional quotations from spreadsheets. A technique for associating the signature with the quotation in the Microsoft Word document is also proposed for generation of integrated authenticable quotations that survive copy-and-paste operations.en_US
dc.language.isoen_USen_US
dc.subjectAuthenticable quotationen_US
dc.subjectinformation securityen_US
dc.subjectMicrosoft Excelen_US
dc.subjectMicrosoft Worden_US
dc.subjectquotation authenticationen_US
dc.titleQuotation Authentication: A New Approach and Efficient Solutions by Cascaded Hashing Techniquesen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/TIFS.2010.2072501en_US
dc.identifier.journalIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITYen_US
dc.citation.volume5en_US
dc.citation.issue4en_US
dc.citation.spage945en_US
dc.citation.epage954en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000284360000030-
dc.citation.woscount1-
Appears in Collections:Articles


Files in This Item:

  1. 000284360000030.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.