On the (In)Security of Two Buyer-Seller Watermarking Protocols.
Geong Sen PohKeith M. MartinPublished in: SECRYPT (2008)
Keyphrases
- electronic commerce
- trusted third party
- transaction costs
- security protocols
- third party
- key agreement protocol
- security properties
- security services
- authentication protocol
- cryptographic protocols
- communication protocols
- intrusion detection
- online marketplaces
- key exchange
- digital images
- network security
- information security
- image watermarking
- security issues
- messages exchanged
- security policies
- seller agents
- key distribution
- secure multiparty computation
- copyright protection
- application level
- key management
- access control
- security analysis
- mechanism design
- multi party
- rfid tags
- decision process
- semi honest
- software agents