My Account Log in

1 option

Information Security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings / edited by Masahiro Mambo, Yuliang Zheng.

LIBRA Q341 .P7 2004
Loading location information...

Available from offsite location This item is stored in our repository but can be checked out.

Log in to request item
Format:
Book
Contributor:
Mambo, Masahiro, editor.
Zheng, Yuliang, 1962- editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Lecture notes in computer science 0302-9743 ; 1729.
Lecture Notes in Computer Science, 0302-9743 ; 1729
Language:
English
Subjects (All):
Data encryption (Computer science).
Algorithms.
Computer science--Mathematics.
Computer science.
Computer networks.
Management information systems.
Cryptology.
Algorithm Analysis and Problem Complexity.
Discrete Mathematics in Computer Science.
Computer Communication Networks.
Management of Computing and Information Systems.
Local Subjects:
Cryptology.
Algorithm Analysis and Problem Complexity.
Discrete Mathematics in Computer Science.
Computer Communication Networks.
Management of Computing and Information Systems.
Physical Description:
1 online resource (X, 286 pages).
Edition:
First edition 1999.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1999.
System Details:
text file PDF
Contents:
Electronic Money
Spending Programs: A Tool for Flexible Micropayments
Money Conservation via Atomicity in Fair Off-Line E-Cash
Engineering an eCash System
Electronic Payment and Unlinkability
Unlinkable Electronic Coupon Protocol with Anonymity Control
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives
Secure Software Components, Mobile Agents, and Authentication
Security Properties of Software Components
Methods for Protecting a Mobile Agent's Route
Non-interactive Cryptosystem for Entity Authentication
Network Security
Implementation of Virtual Private Networks at the Transport Layer
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks
Digital Watermarking
Highly Robust Image Watermarking Using Complementary Modulations
Region-Based Watermarking for Images
Digital Watermarking Robust Against JPEG Compression
Protection of Software and Data
Fingerprints for Copyright Software Protection
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption
Electronic Money, Key Recovery, and Electronic Voting
On Anonymous Electronic Cash and Crime
On the Difficulty of Key Recovery Systems
An Improvement on a Practical Secret Voting Scheme
Digital Signatures
Undeniable Confirmer Signature
Extended Proxy Signatures for Smart Cards
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
Cryptanalysis of Two Group Signature Schemes.
Other Format:
Printed edition:
ISBN:
978-3-540-47790-7
9783540477907
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account