Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings

This book constitutes the refereed proceedings of the Second Internati onal Information Security Workshop, ISWF99, held in Kuala Lumpur, Mala ysia in November 1999. The 23 revised full papers presented were caref ully reviewed and selected from 38 submissions. The book is divided in topical sections on electronic money; electronic payment and unlinkab ility; secure software components, mobile agents, and authentication; network security; digital watermarking; protection of software and dat a; key recovery and electronic voting; and digital signatures.

1111354073
Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings

This book constitutes the refereed proceedings of the Second Internati onal Information Security Workshop, ISWF99, held in Kuala Lumpur, Mala ysia in November 1999. The 23 revised full papers presented were caref ully reviewed and selected from 38 submissions. The book is divided in topical sections on electronic money; electronic payment and unlinkab ility; secure software components, mobile agents, and authentication; network security; digital watermarking; protection of software and dat a; key recovery and electronic voting; and digital signatures.

54.99 Out Of Stock
Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings

Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings

Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings

Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings

Paperback(1999)

$54.99 
  • SHIP THIS ITEM
    Temporarily Out of Stock Online
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

This book constitutes the refereed proceedings of the Second Internati onal Information Security Workshop, ISWF99, held in Kuala Lumpur, Mala ysia in November 1999. The 23 revised full papers presented were caref ully reviewed and selected from 38 submissions. The book is divided in topical sections on electronic money; electronic payment and unlinkab ility; secure software components, mobile agents, and authentication; network security; digital watermarking; protection of software and dat a; key recovery and electronic voting; and digital signatures.


Product Details

ISBN-13: 9783540666950
Publisher: Springer Berlin Heidelberg
Publication date: 10/20/1999
Series: Lecture Notes in Computer Science , #1729
Edition description: 1999
Pages: 286
Product dimensions: 6.10(w) x 9.25(h) x 0.02(d)

Table of Contents

Electronic Money.- Spending Programs: A Tool for Flexible Micropayments.- Money Conservation via Atomicity in Fair Off-Line E-Cash.- Engineering an eCash System.- Electronic Payment and Unlinkability.- Unlinkable Electronic Coupon Prool with Anonymity Control.- On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives.- Secure Software Components, Mobile Agents, and Authentication.- Security Properties of Software Components.- Methods for Protecting a Mobile Agent’s Route.- Non-interactive Cryptosystem for Entity Authentication.- Network Security.- Implementation of Virtual Private Networks at the Transport Layer.- Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree.- Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks.- Digital Watermarking.- Highly Robust Image Watermarking Using Complementary Modulations.- Region-Based Watermarking for Images.- Digital Watermarking Robust Against JPEG Compression.- Protection of Software and Data.- Fingerprints for Copyright Software Protection.- A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption.- Electronic Money, Key Recovery, and Electronic Voting.- On Anonymous Electronic Cash and Crime.- On the Difficulty of Key Recovery Systems.- An Improvement on a Practical Secret Voting Scheme.- Digital Signatures.- Undeniable Confirmer Signature.- Extended Proxy Signatures for Smart Cards.- A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.- Cryptanalysis of Two Group Signature Schemes.
From the B&N Reads Blog

Customer Reviews