Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings by Masahiro MamboInformation Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings by Masahiro Mambo

Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7…

EditorMasahiro Mambo, Yuliang Zheng

Paperback | October 20, 1999

Pricing and Purchase Info

$128.95

Earn 645 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the refereed proceedings of the Second International Information Security Workshop, ISW'99, held in Kuala Lumpur, Malaysia in November 1999.The 23 revised full papers presented were carefully reviewed and selected from 38 submissions. The book is divided in topical sections on electronic money; electronic payment and unlinkability; secure software components, mobile agents, and authentication; network security; digital watermarking; protection of software and data; key recovery and electronic voting; and digital signatures.
Title:Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7…Format:PaperbackDimensions:296 pagesPublished:October 20, 1999Publisher:Springer Berlin HeidelbergLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540666958

ISBN - 13:9783540666950

Reviews

Table of Contents

Electronic Money.- Spending Programs: A Tool for Flexible Micropayments.- Money Conservation via Atomicity in Fair Off-Line E-Cash.- Engineering an eCash System.- Electronic Payment and Unlinkability.- Unlinkable Electronic Coupon Protocol with Anonymity Control.- On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives.- Secure Software Components, Mobile Agents, and Authentication.- Security Properties of Software Components.- Methods for Protecting a Mobile Agent's Route.- Non-interactive Cryptosystem for Entity Authentication.- Network Security.- Implementation of Virtual Private Networks at the Transport Layer.- Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree.- Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks.- Digital Watermarking.- Highly Robust Image Watermarking Using Complementary Modulations.- Region-Based Watermarking for Images.- Digital Watermarking Robust Against JPEG Compression.- Protection of Software and Data.- Fingerprints for Copyright Software Protection.- A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption.- Electronic Money, Key Recovery, and Electronic Voting.- On Anonymous Electronic Cash and Crime.- On the Difficulty of Key Recovery Systems.- An Improvement on a Practical Secret Voting Scheme.- Digital Signatures.- Undeniable Confirmer Signature.- Extended Proxy Signatures for Smart Cards.- A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.- Cryptanalysis of Two Group Signature Schemes.