Information Security: 2nd International Workshop, Isw'99, Kuala Lumpur, Malaysia, November 6-7 , 1999 : Proceedings

by ; ; ; ; ;
Format: Paperback
Pub. Date: 1999-06-01
Publisher(s): Springer Verlag
List Price: $106.96

Rent Textbook

Select for Price
There was a problem. Please try again later.

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

This book constitutes the refereed proceedings of the Second International Information Security Workshop, ISW'99, held in Kuala Lumpur, Malaysia in November 1999.The 23 revised full papers presented were carefully reviewed and selected from 38 submissions. The book is divided in topical sections on electronic money; electronic payment and unlinkability; secure software components, mobile agents, and authentication; network security; digital watermarking; protection of software and data; key recovery and electronic voting; and digital signatures.

Table of Contents

Electronic Money
Spending Programs: A Tool for Flexible Micropayments
1(13)
Josep Domingo-Ferrer
Jordi Herrera-Joancomarti
Money Conservation via Atomicity in Fair Off-Line E-Cash
14(18)
Shouhuai Xu
Moti Yung
Gendu Zhang
Hong Zhu
Engineering an eCash System
32(5)
Tim Ebringer
Peter Thorne
Electronic Payment and Unlinkability
Unlinkable Electronic Coupon Protocol with Anonymity Control
37(10)
Toru Nakanishi
Nobuaki Haruna
Yuji Sugiyama
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives
47(5)
Marc Joye
Narn-Yih Lee
Tzonelih Hwang
Secure Software Components, Mobile Agents, and Authentication
Security Properties of Software Components
52(5)
Khaled Khan
Jun Han
Yuliang Zheng
Methods for Protecting a Mobile Agent's Route
57(15)
Dirk Westhoff
Markus Schneider
Claus Unger
Firoz Kaderali
Non-interactive Cryptosystem for Entity Authentication
72(13)
Hyung-Woo Lee
Jung-Eun Kim
Tai-Yun Kim
Network Security
Implementation of Virtual Private Networks at the Transport Layer
85(18)
Jorge Davila
Javier Lopez
Rene Peralta
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree
103(15)
Hiroaki Kikuchi
Kensuke Abe
Shohachiro Nakanishi
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks
118(18)
Yuji Watanabe
Hideki Imai
Digital Watermarking
Highly Robust Image Watermaking Using Complementary Modulations
136(18)
Chun-Shien Lu
Hong-Yuan Mark Liao
Shih-Kun Huang
Chwen-Jye Sze
Region-Based Watermarking for Images
154(13)
Gareth Brisbane
Rei Safavi-Naini
Philip Ogunbona
Digital Watermarking Robust Against JPEG Compression
167(11)
Hye-Joo Lee
Ji-Hwan Park
Yuliang Zheng
Protection of Software and Data
Fingerprints for Copyright Software Protection
178(13)
Josef Pieprzyk
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption
191(11)
Sang Uk Shin
Kyeong Seop Sim
Kyung Hyune Rhee
Electronic Money, Key Recovery, and Electronic Voting
On Anonymous Electronic Cash and Crime
202(5)
Tomas Sander
Amnon Ta-Shma
On the Difficulty of Key Recovery Systems
207(18)
Seungjoo Kim
Insoo Lee
Masahiro Mambo
Sungjun Park
An Improvement on a Practical Secret Voting Scheme
225(10)
Miyako Ohkubo
Fumiaki Miura
Masayuki Abe
Atsushi Fujioka
Tatsuaki Okamoto
Digital Signatures
Undeniable Confirmer Signature
235(12)
Khanh Nguyen
Yi Mu
Vijay Varadharajan
Extended Proxy Signatures for Smart Cards
247(12)
Takeshi Okamoto
Mitsuru Tada
Eiji Okamoto
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
259(12)
Tsuyoshi Nishioka
Goichiro Hanaoka
Hideki Imai
Cryptanalysis of Two Group Signature Schemes
271(6)
Marc Joye
Seungjoo Kim
Narn-Yih Lee
Author Index 277

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.