W
Weidong Kou
Researcher at Xidian University
Publications - 12
Citations - 491
Weidong Kou is an academic researcher from Xidian University. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 7, co-authored 12 publications receiving 467 citations. Previous affiliations of Weidong Kou include IBM.
Papers
More filters
Journal ArticleDOI
A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
Xuefei Cao,Weidong Kou,Xiaoni Du +2 more
TL;DR: An identity-based authenticated key agreement protocol which removes bilinear pairings is proposed which minimizes message exchange time with no extra cost and provides strong security guarantees including key compromise impersonation resilience, perfect forward secrecy, and master key forward secrecy.
Journal ArticleDOI
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
TL;DR: IMBAS is presented, an identity-based multi-user broadcast authentication scheme with strong security, sound scalability and efficiency for WSN, and Quantitative energy analysis shows that IMBAS reduces energy consumption by at least 41.5 percent compared with previous identity- based scheme.
Journal ArticleDOI
Secure buyer-seller watermarking protocol
Jun Zhang,Weidong Kou,Kai Fan +2 more
TL;DR: A secure buyer-seller watermarking protocol without the assistance of a TTP is proposed in which there are only two participants, a seller and a buyer, which can trace piracy and protect the customer's rights.
Journal ArticleDOI
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol
TL;DR: Experimental results demonstrate that the enhanced water marking scheme eliminates the drawbacks of Solanki et al.'s scheme and that the proposed watermarking scheme in the encrypted domain outperforms Kuribayashi and Tanaka's scheme.
Journal ArticleDOI
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks
TL;DR: Numerical analysis and computer simulation results demonstrate that the proposed protocol outperforms the existing ones in terms of the registration delay, the registration signaling traffic, and the computational load on a Mobile Node (MN) while improving security.