Information Security [electronic resource] : Second InternationalWorkshop, ISW’99 Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings /

Electronic Money -- Spending Programs: A Tool for Flexible Micropayments -- Money Conservation via Atomicity in Fair Off-Line E-Cash -- Engineering an eCash System -- Electronic Payment and Unlinkability -- Unlinkable Electronic Coupon Protocol with Anonymity Control -- On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives -- Secure Software Components, Mobile Agents, and Authentication -- Security Properties of Software Components -- Methods for Protecting a Mobile Agent’s Route -- Non-interactive Cryptosystem for Entity Authentication -- Network Security -- Implementation of Virtual Private Networks at the Transport Layer -- Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree -- Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks -- Digital Watermarking -- Highly Robust Image Watermarking Using Complementary Modulations -- Region-Based Watermarking for Images -- Digital Watermarking Robust Against JPEG Compression -- Protection of Software and Data -- Fingerprints for Copyright Software Protection -- A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption -- Electronic Money, Key Recovery, and Electronic Voting -- On Anonymous Electronic Cash and Crime -- On the Difficulty of Key Recovery Systems -- An Improvement on a Practical Secret Voting Scheme -- Digital Signatures -- Undeniable Confirmer Signature -- Extended Proxy Signatures for Smart Cards -- A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures -- Cryptanalysis of Two Group Signature Schemes.

Saved in:
Bibliographic Details
Main Authors: Mambo, Masahiro. author., Zheng, Yuliang. author., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 1999
Subjects:Computer science., Computer communication systems., Data encryption (Computer science)., Algorithms., Computer science, Management information systems., Computer Science., Data Encryption., Algorithm Analysis and Problem Complexity., Discrete Mathematics in Computer Science., Computer Communication Networks., Management of Computing and Information Systems.,
Online Access:http://dx.doi.org/10.1007/3-540-47790-X
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:208250
record_format koha
spelling KOHA-OAI-TEST:2082502018-07-30T23:38:55ZInformation Security [electronic resource] : Second InternationalWorkshop, ISW’99 Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings / Mambo, Masahiro. author. Zheng, Yuliang. author. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg,1999.engElectronic Money -- Spending Programs: A Tool for Flexible Micropayments -- Money Conservation via Atomicity in Fair Off-Line E-Cash -- Engineering an eCash System -- Electronic Payment and Unlinkability -- Unlinkable Electronic Coupon Protocol with Anonymity Control -- On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives -- Secure Software Components, Mobile Agents, and Authentication -- Security Properties of Software Components -- Methods for Protecting a Mobile Agent’s Route -- Non-interactive Cryptosystem for Entity Authentication -- Network Security -- Implementation of Virtual Private Networks at the Transport Layer -- Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree -- Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks -- Digital Watermarking -- Highly Robust Image Watermarking Using Complementary Modulations -- Region-Based Watermarking for Images -- Digital Watermarking Robust Against JPEG Compression -- Protection of Software and Data -- Fingerprints for Copyright Software Protection -- A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption -- Electronic Money, Key Recovery, and Electronic Voting -- On Anonymous Electronic Cash and Crime -- On the Difficulty of Key Recovery Systems -- An Improvement on a Practical Secret Voting Scheme -- Digital Signatures -- Undeniable Confirmer Signature -- Extended Proxy Signatures for Smart Cards -- A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures -- Cryptanalysis of Two Group Signature Schemes.Computer science.Computer communication systems.Data encryption (Computer science).Algorithms.Computer scienceManagement information systems.Computer Science.Data Encryption.Algorithm Analysis and Problem Complexity.Discrete Mathematics in Computer Science.Computer Communication Networks.Management of Computing and Information Systems.Springer eBookshttp://dx.doi.org/10.1007/3-540-47790-XURN:ISBN:9783540477907
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Computer communication systems.
Data encryption (Computer science).
Algorithms.
Computer science
Management information systems.
Computer Science.
Data Encryption.
Algorithm Analysis and Problem Complexity.
Discrete Mathematics in Computer Science.
Computer Communication Networks.
Management of Computing and Information Systems.
Computer science.
Computer communication systems.
Data encryption (Computer science).
Algorithms.
Computer science
Management information systems.
Computer Science.
Data Encryption.
Algorithm Analysis and Problem Complexity.
Discrete Mathematics in Computer Science.
Computer Communication Networks.
Management of Computing and Information Systems.
spellingShingle Computer science.
Computer communication systems.
Data encryption (Computer science).
Algorithms.
Computer science
Management information systems.
Computer Science.
Data Encryption.
Algorithm Analysis and Problem Complexity.
Discrete Mathematics in Computer Science.
Computer Communication Networks.
Management of Computing and Information Systems.
Computer science.
Computer communication systems.
Data encryption (Computer science).
Algorithms.
Computer science
Management information systems.
Computer Science.
Data Encryption.
Algorithm Analysis and Problem Complexity.
Discrete Mathematics in Computer Science.
Computer Communication Networks.
Management of Computing and Information Systems.
Mambo, Masahiro. author.
Zheng, Yuliang. author.
SpringerLink (Online service)
Information Security [electronic resource] : Second InternationalWorkshop, ISW’99 Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings /
description Electronic Money -- Spending Programs: A Tool for Flexible Micropayments -- Money Conservation via Atomicity in Fair Off-Line E-Cash -- Engineering an eCash System -- Electronic Payment and Unlinkability -- Unlinkable Electronic Coupon Protocol with Anonymity Control -- On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives -- Secure Software Components, Mobile Agents, and Authentication -- Security Properties of Software Components -- Methods for Protecting a Mobile Agent’s Route -- Non-interactive Cryptosystem for Entity Authentication -- Network Security -- Implementation of Virtual Private Networks at the Transport Layer -- Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree -- Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks -- Digital Watermarking -- Highly Robust Image Watermarking Using Complementary Modulations -- Region-Based Watermarking for Images -- Digital Watermarking Robust Against JPEG Compression -- Protection of Software and Data -- Fingerprints for Copyright Software Protection -- A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption -- Electronic Money, Key Recovery, and Electronic Voting -- On Anonymous Electronic Cash and Crime -- On the Difficulty of Key Recovery Systems -- An Improvement on a Practical Secret Voting Scheme -- Digital Signatures -- Undeniable Confirmer Signature -- Extended Proxy Signatures for Smart Cards -- A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures -- Cryptanalysis of Two Group Signature Schemes.
format Texto
topic_facet Computer science.
Computer communication systems.
Data encryption (Computer science).
Algorithms.
Computer science
Management information systems.
Computer Science.
Data Encryption.
Algorithm Analysis and Problem Complexity.
Discrete Mathematics in Computer Science.
Computer Communication Networks.
Management of Computing and Information Systems.
author Mambo, Masahiro. author.
Zheng, Yuliang. author.
SpringerLink (Online service)
author_facet Mambo, Masahiro. author.
Zheng, Yuliang. author.
SpringerLink (Online service)
author_sort Mambo, Masahiro. author.
title Information Security [electronic resource] : Second InternationalWorkshop, ISW’99 Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings /
title_short Information Security [electronic resource] : Second InternationalWorkshop, ISW’99 Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings /
title_full Information Security [electronic resource] : Second InternationalWorkshop, ISW’99 Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings /
title_fullStr Information Security [electronic resource] : Second InternationalWorkshop, ISW’99 Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings /
title_full_unstemmed Information Security [electronic resource] : Second InternationalWorkshop, ISW’99 Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings /
title_sort information security [electronic resource] : second internationalworkshop, isw’99 kuala lumpur, malaysia, november 6-7, 1999 proceedings /
publisher Berlin, Heidelberg : Springer Berlin Heidelberg,
publishDate 1999
url http://dx.doi.org/10.1007/3-540-47790-X
work_keys_str_mv AT mambomasahiroauthor informationsecurityelectronicresourcesecondinternationalworkshopisw99kualalumpurmalaysianovember671999proceedings
AT zhengyuliangauthor informationsecurityelectronicresourcesecondinternationalworkshopisw99kualalumpurmalaysianovember671999proceedings
AT springerlinkonlineservice informationsecurityelectronicresourcesecondinternationalworkshopisw99kualalumpurmalaysianovember671999proceedings
_version_ 1756268496659939328