skip to main content
Primo Search
Search in: Busca Geral

Information security Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings

ISW'99 (1999 Kuala Lumpur, Malaysia) Masahiro Mambo; Yuliang Zheng 1962-

Berlin Springer New York c1999

Localização: ICMC - Inst. Ciên. Mat. Computação    (68-02 LNCS v.1729 e.1 ) e outros locais(Acessar)

  • Título:
    Information security Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings
  • Autor: ISW'99 (1999 Kuala Lumpur, Malaysia)
  • Masahiro Mambo; Yuliang Zheng 1962-
  • Assuntos: Computer security -- Congresses; Computers -- Access control -- Congresses; COMBINATÓRIA
  • Notas: Includes bibliographical references and index
  • Descrição: Spending programs : a tool for flexible micropayments / Josep Domingo-Ferrer and Jordi Herrera-Joancomartí -- Money conservation via atomicity in fair off-line e-cash / Shouhuai Xu ... [et al.] -- Engineering an eCash system / Tim Ebringer andPeter Thorne -- Unlinkable electronic coupon protocol with anonymity control / Toru Nakanishi, Nobuaki Haruna, and Yuji Sugiyama -- On the security of the Lee-Chang group signature scheme and its derivatives / M arc Joye, Narn-Yih Lee, andTzonelih Hwang -- Security properties of software components / Khaled Khan, Jun Han, and Yuliang Zheng --Methods for protecting a mobile agent's route / Dirk Westhoff ... [et al.] -- Non-interactive c ryptosystem for entity authentication /Hyung-Woo Lee, Jung-Eun Kim, and Tai-Yun Kim -- Implementation of virtual private networks at the transport layer / Jorge Davila, Javier Lopez, and Rene Peralta -- Performance evaluation o f certificate revocation using k-valued hash tree /Hiroaki Kikuchi, Kensuke Abe, and Shohachiro Nakanishi -- Active rebooting method for proactivized system : how to enhance the security against latent virus attacks / Yuji Wata nabe and Hideki Imai -- Highly robust image watermarking usingcomplementary modulations / Chun-Shien Lu ... [et al.] -- Region-based watermarking for images / Gareth Brisbane, Rei Safavi-Naini, and Philip Ogunbona -- Digital wa termarking robust against JPEG compression / Hye-Joo Lee, Ji-Hwan Park, andYuliang Zheng -- Fingerprints for
    copyright software protection / Josef Pieprzyk -- A secrecy scheme for MPEG video data using the joint of compression and encryption / Sang Uk Shin, Kyeong Seop Sim, and Kyung Hyune Rhee -- On anonymouselectronic cash and crime / Tomas Sander and Amnon Ta-Shma -- On the difficulty of key recovery systems / Seungjoo Kim ... [et al.] -- An impro vement on a practical secret voting scheme / Miyako Ohkubo ... [et al.] -- Undeniable confirmersignature / Khanh Nguyen, Yi Mu, and Vijay Varadharajan -- Extended p
  • Títulos relacionados: Série:Lecture notes in computer science 1729
  • Editor: Berlin Springer New York
  • Data de criação/publicação: c1999
  • Formato: ix, 275 p. ill. 24 cm.
  • Idioma: Inglês

Buscando em bases de dados remotas. Favor aguardar.