Design of traceable security system

Henry Ker Chang Chang*, Erl Huei Lu, Pin Chang Su

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

1 Scopus citations


Computer crimes are widely recognized as a significant computer threat. The submission of evidence in any type of legal proceeding is typically challenging, but when computers are involved, the problems are intensified. Special knowledge is required to locate and collect evidence and special care must be taken to preserve and transport the evidence. Evidence of a computer crime differs from conventional types of evidence in that most computer-related evidence is intangible-in the form of electronic pulses or magnetic charges. This paper presents a new scheme that has an analogy in natural immunology. A new method of identifying attackers that involves cryptology is also presented. The proposed method can be applied to various fields in information security, including digital signatures, conference key distribution schemes and on-line broadcasting security.

Original languageEnglish
Pages (from-to)933-944
Number of pages12
JournalApplied Mathematics and Computation
Issue number2
StatePublished - 15 09 2005


  • Computer crime
  • Conference key distribution
  • Digital signatures
  • Traceable security


Dive into the research topics of 'Design of traceable security system'. Together they form a unique fingerprint.

Cite this