did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540666950

Information Security: 2nd International Workshop, Isw'99, Kuala Lumpur, Malaysia, November 6-7 , 1999 : Proceedings

by ; ; ; ; ;
  • ISBN13:

    9783540666950

  • ISBN10:

    3540666958

  • Format: Paperback
  • Copyright: 1999-06-01
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $99.00

Summary

This book constitutes the refereed proceedings of the Second International Information Security Workshop, ISW'99, held in Kuala Lumpur, Malaysia in November 1999.The 23 revised full papers presented were carefully reviewed and selected from 38 submissions. The book is divided in topical sections on electronic money; electronic payment and unlinkability; secure software components, mobile agents, and authentication; network security; digital watermarking; protection of software and data; key recovery and electronic voting; and digital signatures.

Table of Contents

Electronic Money
Spending Programs: A Tool for Flexible Micropayments
1(13)
Josep Domingo-Ferrer
Jordi Herrera-Joancomarti
Money Conservation via Atomicity in Fair Off-Line E-Cash
14(18)
Shouhuai Xu
Moti Yung
Gendu Zhang
Hong Zhu
Engineering an eCash System
32(5)
Tim Ebringer
Peter Thorne
Electronic Payment and Unlinkability
Unlinkable Electronic Coupon Protocol with Anonymity Control
37(10)
Toru Nakanishi
Nobuaki Haruna
Yuji Sugiyama
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives
47(5)
Marc Joye
Narn-Yih Lee
Tzonelih Hwang
Secure Software Components, Mobile Agents, and Authentication
Security Properties of Software Components
52(5)
Khaled Khan
Jun Han
Yuliang Zheng
Methods for Protecting a Mobile Agent's Route
57(15)
Dirk Westhoff
Markus Schneider
Claus Unger
Firoz Kaderali
Non-interactive Cryptosystem for Entity Authentication
72(13)
Hyung-Woo Lee
Jung-Eun Kim
Tai-Yun Kim
Network Security
Implementation of Virtual Private Networks at the Transport Layer
85(18)
Jorge Davila
Javier Lopez
Rene Peralta
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree
103(15)
Hiroaki Kikuchi
Kensuke Abe
Shohachiro Nakanishi
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks
118(18)
Yuji Watanabe
Hideki Imai
Digital Watermarking
Highly Robust Image Watermaking Using Complementary Modulations
136(18)
Chun-Shien Lu
Hong-Yuan Mark Liao
Shih-Kun Huang
Chwen-Jye Sze
Region-Based Watermarking for Images
154(13)
Gareth Brisbane
Rei Safavi-Naini
Philip Ogunbona
Digital Watermarking Robust Against JPEG Compression
167(11)
Hye-Joo Lee
Ji-Hwan Park
Yuliang Zheng
Protection of Software and Data
Fingerprints for Copyright Software Protection
178(13)
Josef Pieprzyk
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption
191(11)
Sang Uk Shin
Kyeong Seop Sim
Kyung Hyune Rhee
Electronic Money, Key Recovery, and Electronic Voting
On Anonymous Electronic Cash and Crime
202(5)
Tomas Sander
Amnon Ta-Shma
On the Difficulty of Key Recovery Systems
207(18)
Seungjoo Kim
Insoo Lee
Masahiro Mambo
Sungjun Park
An Improvement on a Practical Secret Voting Scheme
225(10)
Miyako Ohkubo
Fumiaki Miura
Masayuki Abe
Atsushi Fujioka
Tatsuaki Okamoto
Digital Signatures
Undeniable Confirmer Signature
235(12)
Khanh Nguyen
Yi Mu
Vijay Varadharajan
Extended Proxy Signatures for Smart Cards
247(12)
Takeshi Okamoto
Mitsuru Tada
Eiji Okamoto
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
259(12)
Tsuyoshi Nishioka
Goichiro Hanaoka
Hideki Imai
Cryptanalysis of Two Group Signature Schemes
271(6)
Marc Joye
Seungjoo Kim
Narn-Yih Lee
Author Index 277

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program