E-Book, Englisch, Band 1729, 286 Seiten, eBook
Mambo / Zheng Information Security
Erscheinungsjahr 2003
ISBN: 978-3-540-47790-7
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings
E-Book, Englisch, Band 1729, 286 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-47790-7
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Electronic Money.- Spending Programs: A Tool for Flexible Micropayments.- Money Conservation via Atomicity in Fair Off-Line E-Cash.- Engineering an eCash System.- Electronic Payment and Unlinkability.- Unlinkable Electronic Coupon Protocol with Anonymity Control.- On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives.- Secure Software Components, Mobile Agents, and Authentication.- Security Properties of Software Components.- Methods for Protecting a Mobile Agent’s Route.- Non-interactive Cryptosystem for Entity Authentication.- Network Security.- Implementation of Virtual Private Networks at the Transport Layer.- Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree.- Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks.- Digital Watermarking.- Highly Robust Image Watermarking Using Complementary Modulations.- Region-Based Watermarking for Images.- Digital Watermarking Robust Against JPEG Compression.- Protection of Software and Data.- Fingerprints for Copyright Software Protection.- A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption.- Electronic Money, Key Recovery, and Electronic Voting.- On Anonymous Electronic Cash and Crime.- On the Difficulty of Key Recovery Systems.- An Improvement on a Practical Secret Voting Scheme.- Digital Signatures.- Undeniable Confirmer Signature.- Extended Proxy Signatures for Smart Cards.- A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.- Cryptanalysis of Two Group Signature Schemes.