Vai al contenuto principale della pagina

Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings / / Masahiro Mambo, Yuliang Zheng (editors)



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings / / Masahiro Mambo, Yuliang Zheng (editors) Visualizza cluster
Pubblicazione: Berlin ; ; Heidelberg : , : Springer, , [1999]
©1999
Edizione: 1st ed. 1999.
Descrizione fisica: 1 online resource (X, 286 p.)
Disciplina: 005.8
Soggetto topico: Computer security
Persona (resp. second.): MamboMasahiro
ZhengYuliang <1962->
Note generali: Bibliographic Level Mode of Issuance: Monograph
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Electronic Money -- Spending Programs: A Tool for Flexible Micropayments -- Money Conservation via Atomicity in Fair Off-Line E-Cash -- Engineering an eCash System -- Electronic Payment and Unlinkability -- Unlinkable Electronic Coupon Protocol with Anonymity Control -- On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives -- Secure Software Components, Mobile Agents, and Authentication -- Security Properties of Software Components -- Methods for Protecting a Mobile Agent’s Route -- Non-interactive Cryptosystem for Entity Authentication -- Network Security -- Implementation of Virtual Private Networks at the Transport Layer -- Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree -- Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks -- Digital Watermarking -- Highly Robust Image Watermarking Using Complementary Modulations -- Region-Based Watermarking for Images -- Digital Watermarking Robust Against JPEG Compression -- Protection of Software and Data -- Fingerprints for Copyright Software Protection -- A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption -- Electronic Money, Key Recovery, and Electronic Voting -- On Anonymous Electronic Cash and Crime -- On the Difficulty of Key Recovery Systems -- An Improvement on a Practical Secret Voting Scheme -- Digital Signatures -- Undeniable Confirmer Signature -- Extended Proxy Signatures for Smart Cards -- A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures -- Cryptanalysis of Two Group Signature Schemes.
Titolo autorizzato: Information Security  Visualizza cluster
ISBN: 3-540-47790-X
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 996465745203316
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Computer Science, . 0302-9743 ; ; 1729