当前位置:首页 > 其他书籍
Information security Second International Workshop
Information security Second International Workshop

Information security Second International WorkshopPDF电子书下载

其他书籍

  • 电子书积分:20 积分如何计算积分?
  • 作 者:ISW99
  • 出 版 社:Kuala Lumpur
  • 出版年份:2222
  • ISBN:
  • 页数:0 页
图书介绍:
《Information security Second International Workshop》目录
标签:

Electronic Money 1

Spending Programs:A Tool for Flexible Micropayments&Josep Domingo-Ferrer and Jordi Herrera-Joancomarti (Uni Rovira iVirgili,Spain) 1

Money Conservation via Atomicity in Fair Off-Line E-Cash&Shouhuai Xu (Fudan Univ.,P.R.China),Moti Yung (CertCo,USA),Gendu Zhang,and Hong Zhu (Fudan Univ.,P.R.China) 14

Engineering an eCash System&Tim Ebringer and Peter Thorne (Univ.of Melbourne,Australia) 32

Electronic Payment and Unlinkability 37

Unlinkable Electronic Coupon Protocol with Anonymity Control&Toru Nakanishi,Nobuaki Haruna,and Yuji Sugiyama (Okayama Univ.,Japan) 37

On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives&Marc Joye (Gemplus,France),Narn-Yih Lee (Nan-Tai Inst.of Tech.,Taiwan,R.O.C.),and Tzonelih Hwang (Cheng-Kung Univ.,Taiwan,R.O.C.) 47

Secure Software Components,Mobile Agents,and Authentication 52

Security Properties of Software Components&Khaled Khan,Jun Han,and Yuliang Zheng (Monash Univ.,Australia) 52

Methods for Protecting a Mobile Agent’s Route&Dirk Westhoff,Markus Schneider,Claus Unger,and Firoz Kaderali(Fern Uni.Hagen,Germany) 57

Non-interactive Cryptosystem for Entity Authentication&Hyung-Woo Lee (Chonan Univ.,Korea),Jung-Eun Kim,andTai- Yun Kim (Korea Univ.,Korea) 72

Network Security 85

Implementation of Virtual Private Networks at the Transport Layer&Jorge Davila (Uni Politecnica de Madrid,Spain),Javier Lopez (Uni de Malaga,Spain),and Rene Peralta (Univ.of Wisconsin-Milwaukee,USA) 85

Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree&Hiroaki Kikuchi,Kensuke Abe,and Shohachiro Nakanishi (Tokai Univ.,Japan) 103

Active Rebooting Method for Proactivized System:How to Enhance the Security against Latent Virus Attacks&Yuji Watanabe and Hideki Imai (Univ.of Tokyo,Japan) 118

Digital Watermarking 136

Highly Robust Image Watermarking Using Complementary Modulations&Chun-Shien Lu,Hong- Yuan Mark Liao,Shih-Kun Huang,and Chwen-Jye Sze (Academia Sinica,Taiwan,R.O.C.) 136

Region-Based Watermarking for Images&Gareth Brisbane,Rei Safavi-Naini (Wollongong,Australia),and Philip Ogunbona (Motorola Australian Research Center,Australia) 154

Digital Watermarking Robust Against JPEG Compression&Hye-Joo Lee,Ji-Hwan Park (PuKyong Nat’l Univ.,Korea),and Yuliang Zheng (Monash Univ.,Australia) 167

Protection of Software and Data 178

Fingerprints for Copyright Software Protection&Josef Pieprzyk (Univ.of Wollongong,Australia) 178

A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption&Sang Uk Shin,Kyeong Seop Sim,and Kyung Hyune Rhee (PuKyong Nat’l Univ.,Korea) 191

Electronic Money,Key Recovery,and Electronic Voting 202

On Anonymous Electronic Cash and Crime&Tomas Sander and Amnon Ta-Shma (Int’l Computer Science Inst.,USA) 202

On the Difficulty of Key Recovery Systems&Seungjoo Kim,Insoo Lee (KISA,Korea),Masahiro Mambo (Tohoku Univ.,Japan),and Sungjun Park (KISA,Korea) 207

An Improvement on a Practical Secret Voting Scheme&Miyako Ohkubo,Fumiaki Miura,Masayuki Abe,Atsushi Fujioka,and Tatsuaki Okamoto (NTT Inf.Sharing Platform Lab.,Japan) 225

Digital Signatures 235

Undeniable Confirmer Signature&Khanh Nguyen,Yi Mu,and Vijay Varadharajan (Univ.of Western Sydney,Australia) 235

Extended Proxy Signatures for Smart Cards&Takeshi Okamoto,Mitsuru Tada (JAIST,Japan),and Eiji Okamoto (Univ.of Wisconsin-Milwaukee,USA) 247

A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures&Tsuyoshi Nishioka (Mitsubishi Electric Corp.,Japan),Goichiro Hanaoka,and Hideki Imai (Univ.of Tokyo,Japan) 259

Cryptanalysis of Two Group Signature Schemes&Marc Joye (Gemplus,France),Seungjoo Kim (KISA,Korea),and Narn-Yih Lee (Nan-Tai Inst.of Tech.,Taiwan,R.O.C.) 271

Author Index 277

返回顶部