Information Security Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Mambo, Masahiro (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Zheng, Yuliang (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1999.
Έκδοση:1st ed. 1999.
Σειρά:Lecture Notes in Computer Science, 1729
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Electronic Money
  • Spending Programs: A Tool for Flexible Micropayments
  • Money Conservation via Atomicity in Fair Off-Line E-Cash
  • Engineering an eCash System
  • Electronic Payment and Unlinkability
  • Unlinkable Electronic Coupon Protocol with Anonymity Control
  • On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives
  • Secure Software Components, Mobile Agents, and Authentication
  • Security Properties of Software Components
  • Methods for Protecting a Mobile Agent's Route
  • Non-interactive Cryptosystem for Entity Authentication
  • Network Security
  • Implementation of Virtual Private Networks at the Transport Layer
  • Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree
  • Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks
  • Digital Watermarking
  • Highly Robust Image Watermarking Using Complementary Modulations
  • Region-Based Watermarking for Images
  • Digital Watermarking Robust Against JPEG Compression
  • Protection of Software and Data
  • Fingerprints for Copyright Software Protection
  • A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption
  • Electronic Money, Key Recovery, and Electronic Voting
  • On Anonymous Electronic Cash and Crime
  • On the Difficulty of Key Recovery Systems
  • An Improvement on a Practical Secret Voting Scheme
  • Digital Signatures
  • Undeniable Confirmer Signature
  • Extended Proxy Signatures for Smart Cards
  • A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
  • Cryptanalysis of Two Group Signature Schemes.