1 option
Information Security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings / edited by Masahiro Mambo, Yuliang Zheng.
LIBRA Q341 .P7 2004
Available from offsite location
- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- Lecture notes in computer science 0302-9743 ; 1729.
- Lecture Notes in Computer Science, 0302-9743 ; 1729
- Language:
- English
- Subjects (All):
- Data encryption (Computer science).
- Algorithms.
- Computer science--Mathematics.
- Computer science.
- Computer networks.
- Management information systems.
- Cryptology.
- Algorithm Analysis and Problem Complexity.
- Discrete Mathematics in Computer Science.
- Computer Communication Networks.
- Management of Computing and Information Systems.
- Local Subjects:
- Cryptology.
- Algorithm Analysis and Problem Complexity.
- Discrete Mathematics in Computer Science.
- Computer Communication Networks.
- Management of Computing and Information Systems.
- Physical Description:
- 1 online resource (X, 286 pages).
- Edition:
- First edition 1999.
- Contained In:
- Springer eBooks
- Place of Publication:
- Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1999.
- System Details:
- text file PDF
- Contents:
- Electronic Money
- Spending Programs: A Tool for Flexible Micropayments
- Money Conservation via Atomicity in Fair Off-Line E-Cash
- Engineering an eCash System
- Electronic Payment and Unlinkability
- Unlinkable Electronic Coupon Protocol with Anonymity Control
- On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives
- Secure Software Components, Mobile Agents, and Authentication
- Security Properties of Software Components
- Methods for Protecting a Mobile Agent's Route
- Non-interactive Cryptosystem for Entity Authentication
- Network Security
- Implementation of Virtual Private Networks at the Transport Layer
- Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree
- Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks
- Digital Watermarking
- Highly Robust Image Watermarking Using Complementary Modulations
- Region-Based Watermarking for Images
- Digital Watermarking Robust Against JPEG Compression
- Protection of Software and Data
- Fingerprints for Copyright Software Protection
- A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption
- Electronic Money, Key Recovery, and Electronic Voting
- On Anonymous Electronic Cash and Crime
- On the Difficulty of Key Recovery Systems
- An Improvement on a Practical Secret Voting Scheme
- Digital Signatures
- Undeniable Confirmer Signature
- Extended Proxy Signatures for Smart Cards
- A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
- Cryptanalysis of Two Group Signature Schemes.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-540-47790-7
- 9783540477907
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.