| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996465745203316 |
|
|
Titolo |
Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings / / Masahiro Mambo, Yuliang Zheng (editors) |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin ; ; Heidelberg : , : Springer, , [1999] |
|
©1999 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 1999.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (X, 286 p.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 0302-9743 ; ; 1729 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Electronic Money -- Spending Programs: A Tool for Flexible Micropayments -- Money Conservation via Atomicity in Fair Off-Line E-Cash -- Engineering an eCash System -- Electronic Payment and Unlinkability -- Unlinkable Electronic Coupon Protocol with Anonymity Control -- On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives -- Secure Software Components, Mobile Agents, and Authentication -- Security Properties of Software Components -- Methods for Protecting a Mobile Agent’s Route -- Non-interactive Cryptosystem for Entity Authentication -- Network Security -- Implementation of Virtual Private Networks at the Transport Layer -- Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree -- Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks -- Digital Watermarking -- Highly Robust Image Watermarking Using Complementary Modulations -- Region-Based Watermarking for Images -- Digital Watermarking Robust Against JPEG Compression -- Protection of Software and Data -- Fingerprints for Copyright Software Protection -- A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption -- Electronic Money, Key Recovery, and Electronic Voting -- On Anonymous Electronic Cash and Crime -- On the Difficulty of Key Recovery Systems -- An Improvement on a Practical Secret Voting Scheme -- Digital Signatures -- Undeniable |
|
|
|
|
|
|
|
|
|
|
Confirmer Signature -- Extended Proxy Signatures for Smart Cards -- A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures -- Cryptanalysis of Two Group Signature Schemes. |
|
|
|
|
|
| |