1.

Record Nr.

UNISA996465745203316

Titolo

Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings / / Masahiro Mambo, Yuliang Zheng (editors)

Pubbl/distr/stampa

Berlin ; ; Heidelberg : , : Springer, , [1999]

©1999

ISBN

3-540-47790-X

Edizione

[1st ed. 1999.]

Descrizione fisica

1 online resource (X, 286 p.)

Collana

Lecture Notes in Computer Science, , 0302-9743 ; ; 1729

Disciplina

005.8

Soggetti

Computer security

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Electronic Money -- Spending Programs: A Tool for Flexible Micropayments -- Money Conservation via Atomicity in Fair Off-Line E-Cash -- Engineering an eCash System -- Electronic Payment and Unlinkability -- Unlinkable Electronic Coupon Protocol with Anonymity Control -- On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives -- Secure Software Components, Mobile Agents, and Authentication -- Security Properties of Software Components -- Methods for Protecting a Mobile Agent’s Route -- Non-interactive Cryptosystem for Entity Authentication -- Network Security -- Implementation of Virtual Private Networks at the Transport Layer -- Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree -- Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks -- Digital Watermarking -- Highly Robust Image Watermarking Using Complementary Modulations -- Region-Based Watermarking for Images -- Digital Watermarking Robust Against JPEG Compression -- Protection of Software and Data -- Fingerprints for Copyright Software Protection -- A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption -- Electronic Money, Key Recovery, and Electronic Voting -- On Anonymous Electronic Cash and Crime -- On the Difficulty of Key Recovery Systems -- An Improvement on a Practical Secret Voting Scheme -- Digital Signatures -- Undeniable



Confirmer Signature -- Extended Proxy Signatures for Smart Cards -- A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures -- Cryptanalysis of Two Group Signature Schemes.