Electronic Money 1
Spending Programs:A Tool for Flexible Micropayments&Josep Domingo-Ferrer and Jordi Herrera-Joancomarti (Uni Rovira iVirgili,Spain) 1
Money Conservation via Atomicity in Fair Off-Line E-Cash&Shouhuai Xu (Fudan Univ.,P.R.China),Moti Yung (CertCo,USA),Gendu Zhang,and Hong Zhu (Fudan Univ.,P.R.China) 14
Engineering an eCash System&Tim Ebringer and Peter Thorne (Univ.of Melbourne,Australia) 32
Electronic Payment and Unlinkability 37
Unlinkable Electronic Coupon Protocol with Anonymity Control&Toru Nakanishi,Nobuaki Haruna,and Yuji Sugiyama (Okayama Univ.,Japan) 37
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives&Marc Joye (Gemplus,France),Narn-Yih Lee (Nan-Tai Inst.of Tech.,Taiwan,R.O.C.),and Tzonelih Hwang (Cheng-Kung Univ.,Taiwan,R.O.C.) 47
Secure Software Components,Mobile Agents,and Authentication 52
Security Properties of Software Components&Khaled Khan,Jun Han,and Yuliang Zheng (Monash Univ.,Australia) 52
Methods for Protecting a Mobile Agent’s Route&Dirk Westhoff,Markus Schneider,Claus Unger,and Firoz Kaderali(Fern Uni.Hagen,Germany) 57
Non-interactive Cryptosystem for Entity Authentication&Hyung-Woo Lee (Chonan Univ.,Korea),Jung-Eun Kim,andTai- Yun Kim (Korea Univ.,Korea) 72
Network Security 85
Implementation of Virtual Private Networks at the Transport Layer&Jorge Davila (Uni Politecnica de Madrid,Spain),Javier Lopez (Uni de Malaga,Spain),and Rene Peralta (Univ.of Wisconsin-Milwaukee,USA) 85
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree&Hiroaki Kikuchi,Kensuke Abe,and Shohachiro Nakanishi (Tokai Univ.,Japan) 103
Active Rebooting Method for Proactivized System:How to Enhance the Security against Latent Virus Attacks&Yuji Watanabe and Hideki Imai (Univ.of Tokyo,Japan) 118
Digital Watermarking 136
Highly Robust Image Watermarking Using Complementary Modulations&Chun-Shien Lu,Hong- Yuan Mark Liao,Shih-Kun Huang,and Chwen-Jye Sze (Academia Sinica,Taiwan,R.O.C.) 136
Region-Based Watermarking for Images&Gareth Brisbane,Rei Safavi-Naini (Wollongong,Australia),and Philip Ogunbona (Motorola Australian Research Center,Australia) 154
Digital Watermarking Robust Against JPEG Compression&Hye-Joo Lee,Ji-Hwan Park (PuKyong Nat’l Univ.,Korea),and Yuliang Zheng (Monash Univ.,Australia) 167
Protection of Software and Data 178
Fingerprints for Copyright Software Protection&Josef Pieprzyk (Univ.of Wollongong,Australia) 178
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption&Sang Uk Shin,Kyeong Seop Sim,and Kyung Hyune Rhee (PuKyong Nat’l Univ.,Korea) 191
Electronic Money,Key Recovery,and Electronic Voting 202
On Anonymous Electronic Cash and Crime&Tomas Sander and Amnon Ta-Shma (Int’l Computer Science Inst.,USA) 202
On the Difficulty of Key Recovery Systems&Seungjoo Kim,Insoo Lee (KISA,Korea),Masahiro Mambo (Tohoku Univ.,Japan),and Sungjun Park (KISA,Korea) 207
An Improvement on a Practical Secret Voting Scheme&Miyako Ohkubo,Fumiaki Miura,Masayuki Abe,Atsushi Fujioka,and Tatsuaki Okamoto (NTT Inf.Sharing Platform Lab.,Japan) 225
Digital Signatures 235
Undeniable Confirmer Signature&Khanh Nguyen,Yi Mu,and Vijay Varadharajan (Univ.of Western Sydney,Australia) 235
Extended Proxy Signatures for Smart Cards&Takeshi Okamoto,Mitsuru Tada (JAIST,Japan),and Eiji Okamoto (Univ.of Wisconsin-Milwaukee,USA) 247
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures&Tsuyoshi Nishioka (Mitsubishi Electric Corp.,Japan),Goichiro Hanaoka,and Hideki Imai (Univ.of Tokyo,Japan) 259
Cryptanalysis of Two Group Signature Schemes&Marc Joye (Gemplus,France),Seungjoo Kim (KISA,Korea),and Narn-Yih Lee (Nan-Tai Inst.of Tech.,Taiwan,R.O.C.) 271
Author Index 277