06436nam 22008055 450 99646600880331620200704062806.03-540-44456-410.1007/3-540-44456-4(CKB)1000000000211374(SSID)ssj0000323989(PQKBManifestationID)11245093(PQKBTitleCode)TC0000323989(PQKBWorkID)10304051(PQKB)11308384(DE-He213)978-3-540-44456-5(MiAaPQ)EBC3073162(PPN)155234919(EXLCZ)99100000000021137420121227d2000 u| 0engurnn#008mamaatxtccrInformation Security[electronic resource] Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings /edited by Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry1st ed. 2000.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2000.1 online resource (X, 322 p.)Lecture Notes in Computer Science,0302-9743 ;1975Bibliographic Level Mode of Issuance: Monograph3-540-41416-9 Includes bibliographical references at the end of each chapters and index.Multimedia Copyright Protection -- A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients -- Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models -- A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection -- Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling -- Region-Based Watermarking by Distribution Adjustment -- Hiding Information in Color Images Using Small Color Palettes -- An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software -- Characteristics of Some Binary Codes for Fingerprinting -- E-Commerce -- An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees -- Unlinkable Divisible Electronic Cash -- Weighted One-Way Hash Chain and Its Applications -- Linkability in Practical Electronic Cash Design -- Towards a Practical Secure Framework for Mobile Code Commerce -- Key Management -- Probabilistic Methods in Multicast Key Management -- Classification of Authentication Protocols: A Practical Approach -- Exploring Fair Exchange Protocols Using Specification Animation -- A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation -- Network Security and Access Control -- An Efficient Protocol for Certified Electronic Mail -- Performance Analysis of Secure Web Server Based on SSL -- Sherlock: Commercial High Assurance Network Computing Extended Abstract -- The Role of the Development Process in Operating System Security -- Cryptographic Systems -- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization -- A Signcryption Scheme Based on Integer Factorization.The third International Workshop on Information Security was held at the U- versity of Wollongong, Australia. The conference was sponsored by the Centre for Computer Security Research, University of Wollongong. The main themes of the conference were the newly emerging issues of Information Security. Mul- media copyright protection and security aspects of e-commerce were two topics that clearly re?ect the focus of the conference. Protection of the copyright of electronic documents seems to be driven by strong practical demand from the industry for new, e cient and secure solutions. Although e-commerce is already booming, it has not reached its full potential in terms of new, e cient and secure e-commerce protocols with added properties. There were 63 papers submitted to the conference. The program committee accepted 23. Of those accepted, six papers were from Australia, ve from Japan, two each from Spain, Germany and the USA, and one each from Finland and Sweden. Four papers were co-authored by international teams from Canada and China, Korea and Australia, Taiwan and Australia, and Belgium, France and Germany, respectively. Final versions of the accepted papers were gathered using computing and other resources of the Institute of Mathematics, Polish Academy of Sciences, Warsaw, Poland. We are especially grateful to Jerzy Urbanowicz and Andrzej Pokrzywa for their help during preparation of the proceedings.Lecture Notes in Computer Science,0302-9743 ;1975Data encryption (Computer science)Computer communication systemsAlgorithmsOperating systems (Computers)Management information systemsComputer scienceCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Data encryption (Computer science).Computer communication systems.Algorithms.Operating systems (Computers).Management information systems.Computer science.Cryptology.Computer Communication Networks.Algorithm Analysis and Problem Complexity.Operating Systems.Management of Computing and Information Systems.005.8Pieprzyk Josefedthttp://id.loc.gov/vocabulary/relators/edtOkamoto Eijiedthttp://id.loc.gov/vocabulary/relators/edtSeberry Jenniferedthttp://id.loc.gov/vocabulary/relators/edtISW 2000MiAaPQMiAaPQMiAaPQBOOK996466008803316Information Security771885UNISA04899nam 2200637 a 450 991079994720332120230721033258.01-281-73683-X97866117368351-57808-556-X(CKB)1000000000552973(EBL)3404282(SSID)ssj0000303557(PQKBManifestationID)11212042(PQKBTitleCode)TC0000303557(PQKBWorkID)10275430(PQKB)11119468(MiAaPQ)EBC3404282(Au-PeEL)EBL3404282(CaPaEBR)ebr10256235(CaONFJC)MIL173683(OCoLC)666934175(EXLCZ)99100000000055297320070917d2007 uy 0engur|n|---|||||txtccrMonitoring and evaluation of soil conservation and watershed development projects[electronic resource] /editors, Jan de Graaff ... [et al.] ; with assistance from Annemarieke de BruinEnfield, NH Science Publishersc20071 online resource (548 p.)Description based upon print version of record.1-57808-349-4 Includes bibliographical references and index.""Foreword""; ""Preface""; ""Contents""; ""List of Contributors""; ""Introduction""; ""Part 1 Principles of M&E in SCWD Projects""; ""1. Principles and Practices of Monitoring and Evaluation for Watershed and Conservation Projects""; ""Introduction""; ""Principles""; ""Monitoring""; ""Evaluation""; ""Conclusions""; ""References""; ""2. Monitoring and Evaluation of Watershed Development Projects in India""; ""Introduction""; ""Approach and Strategy""; ""Component Areas Requiring Evaluation""; ""Sub-areas""; ""Indicators""; ""Methodology""; ""Sampling""; ""An Example of Sampling""""Live or Illustrative Cases""""Tools and Techniques for Data Acquisition""; ""Substainability""; ""Replicability""; ""References""; ""3. Monitoring and Evaluation of Soil Conservation and Watershed Development Projects: An Approach to Sustainable Development""; ""Introduction""; ""Soil Conservation and Watershed Development""; ""Monitoring and Evaluation""; ""Who Should Monitor and Evaluate""; ""Dimensions of M&E""; ""How to Select Parameters for M&E""; ""How to Monitor""; ""How to Evaluate""; ""Report and Response""; ""Conclusion""; ""References""""4. Impact Monitoring of Soil and Water Conservation: Taking a Wider Look""""Taking a Wider Perspective""; ""Development of an Instrument for Impact Monitoring and Assessment in SLM""; ""Six Steps in Impact Monitoring and Assessment""; ""Concluding Remarks""; ""References""; ""5. M&E as Learning: Rethinking the Dominant Paradigm""; ""Introduction""; ""The Key Functions of M&E""; ""A Critical Look at Emerging Issues for M&E Theory and Practice""; ""The Basis for an Alternative Paradigm""; ""Conclusion�Designing M&E as Learning Systems""; ""References""; ""Part 2: M&E in Practice""""6. Monitoring and Evaluation for Efficient Sustainable Development Projects""""Introduction""; ""The Sustainable Development Approach""; ""Monitoring and Evaluation of Project Achievements""; ""A Sample Application""; ""Concluding Remarks""; ""References""; ""7. Using a Watershed Focus for Monitoring and Evaluation of SWC in Nicaragua""; ""Introduction""; ""Project Objectives and Achievement Indicators""; ""Watershed Approach""; ""Progression of Project""; ""Monitoring and Internal Evaluation""; ""External Technical and Financial Evaluation""""Follow-up after the Mitch Reconstruction Project""""Conclusion""; ""References""; ""8. Monitoring and Evaluation of Watershed Projects in India � Field Application and Data Analysis""; ""Introduction""; ""Methods""; ""Results and Discussion""; ""Risk from Rainfall Variations""; ""Risk from Changing Land Use""; ""Risk from Soil Changes""; ""Level and Intensity of Treatment Packages""; ""Silt Deposited due to Drainage Line Structures""; ""Improved Groundwater Status""; ""Enhanced Irrigation Potential""; ""Improved Channel Flow""; ""Increased Biomass Productivity""""Employment Opportunity""Soil conservation projectsEvaluationWater resources developmentEvaluationWatershed managementEvaluationSoil conservation projectsEvaluation.Water resources developmentEvaluation.Watershed managementEvaluation.631.4/5Graaff J. de1587606MiAaPQMiAaPQMiAaPQBOOK9910799947203321Monitoring and evaluation of soil conservation and watershed development projects3875754UNINA