完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Liu, Tsung-Yuan | en_US |
dc.contributor.author | Tsai, Wen-Hsiang | en_US |
dc.date.accessioned | 2014-12-08T15:38:26Z | - |
dc.date.available | 2014-12-08T15:38:26Z | - |
dc.date.issued | 2010-12-01 | en_US |
dc.identifier.issn | 1556-6013 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1109/TIFS.2010.2072501 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/26314 | - |
dc.description.abstract | A new approach to efficient authentication of quotations from trusted sources but embedded in messages created by unknown authors is proposed. Two different techniques for efficient generation of authenticable quotations using cascaded hashing are proposed for conventional quotations, and an efficient two-dimensional signature generation technique is proposed for two-dimensional quotations from spreadsheets. A technique for associating the signature with the quotation in the Microsoft Word document is also proposed for generation of integrated authenticable quotations that survive copy-and-paste operations. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Authenticable quotation | en_US |
dc.subject | information security | en_US |
dc.subject | Microsoft Excel | en_US |
dc.subject | Microsoft Word | en_US |
dc.subject | quotation authentication | en_US |
dc.title | Quotation Authentication: A New Approach and Efficient Solutions by Cascaded Hashing Techniques | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/TIFS.2010.2072501 | en_US |
dc.identifier.journal | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | en_US |
dc.citation.volume | 5 | en_US |
dc.citation.issue | 4 | en_US |
dc.citation.spage | 945 | en_US |
dc.citation.epage | 954 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000284360000030 | - |
dc.citation.woscount | 1 | - |
顯示於類別: | 期刊論文 |