scispace - formally typeset
W

Weidong Kou

Researcher at Xidian University

Publications -  12
Citations -  491

Weidong Kou is an academic researcher from Xidian University. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 7, co-authored 12 publications receiving 467 citations. Previous affiliations of Weidong Kou include IBM.

Papers
More filters
Journal ArticleDOI

A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges

TL;DR: An identity-based authenticated key agreement protocol which removes bilinear pairings is proposed which minimizes message exchange time with no extra cost and provides strong security guarantees including key compromise impersonation resilience, perfect forward secrecy, and master key forward secrecy.
Journal ArticleDOI

IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks

TL;DR: IMBAS is presented, an identity-based multi-user broadcast authentication scheme with strong security, sound scalability and efficiency for WSN, and Quantitative energy analysis shows that IMBAS reduces energy consumption by at least 41.5 percent compared with previous identity- based scheme.
Journal ArticleDOI

Secure buyer-seller watermarking protocol

TL;DR: A secure buyer-seller watermarking protocol without the assistance of a TTP is proposed in which there are only two participants, a seller and a buyer, which can trace piracy and protect the customer's rights.
Journal ArticleDOI

Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol

TL;DR: Experimental results demonstrate that the enhanced water marking scheme eliminates the drawbacks of Solanki et al.'s scheme and that the proposed watermarking scheme in the encrypted domain outperforms Kuribayashi and Tanaka's scheme.
Journal ArticleDOI

Efficient ID-based registration protocol featured with user anonymity in mobile IP networks

TL;DR: Numerical analysis and computer simulation results demonstrate that the proposed protocol outperforms the existing ones in terms of the registration delay, the registration signaling traffic, and the computational load on a Mobile Node (MN) while improving security.