03391oam 2200565 450 99646574520331620210805105512.03-540-47790-X10.1007/3-540-47790-X(CKB)1000000000211084(SSID)ssj0000323994(PQKBManifestationID)11912661(PQKBTitleCode)TC0000323994(PQKBWorkID)10305165(PQKB)10589879(DE-He213)978-3-540-47790-7(MiAaPQ)EBC3072549(MiAaPQ)EBC6495000(PPN)155212265(EXLCZ)99100000000021108420210805d1999 uy 0engurnn|008mamaatxtccrInformation security Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings /Masahiro Mambo, Yuliang Zheng (editors)1st ed. 1999.Berlin ;Heidelberg :Springer,[1999]©19991 online resource (X, 286 p.) Lecture Notes in Computer Science,0302-9743 ;1729Bibliographic Level Mode of Issuance: Monograph3-540-66695-8 Includes bibliographical references and index.Electronic Money -- Spending Programs: A Tool for Flexible Micropayments -- Money Conservation via Atomicity in Fair Off-Line E-Cash -- Engineering an eCash System -- Electronic Payment and Unlinkability -- Unlinkable Electronic Coupon Protocol with Anonymity Control -- On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives -- Secure Software Components, Mobile Agents, and Authentication -- Security Properties of Software Components -- Methods for Protecting a Mobile Agent’s Route -- Non-interactive Cryptosystem for Entity Authentication -- Network Security -- Implementation of Virtual Private Networks at the Transport Layer -- Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree -- Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks -- Digital Watermarking -- Highly Robust Image Watermarking Using Complementary Modulations -- Region-Based Watermarking for Images -- Digital Watermarking Robust Against JPEG Compression -- Protection of Software and Data -- Fingerprints for Copyright Software Protection -- A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption -- Electronic Money, Key Recovery, and Electronic Voting -- On Anonymous Electronic Cash and Crime -- On the Difficulty of Key Recovery Systems -- An Improvement on a Practical Secret Voting Scheme -- Digital Signatures -- Undeniable Confirmer Signature -- Extended Proxy Signatures for Smart Cards -- A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures -- Cryptanalysis of Two Group Signature Schemes.Lecture Notes in Computer Science,0302-9743 ;1729Computer securityCongressesComputer security005.8Mambo MasahiroZheng Yuliang1962-ISW'99MiAaPQMiAaPQUtOrBLWBOOK996465745203316Information Security771885UNISA