| Electronic Money |
|
|
Spending Programs: A Tool for Flexible Micropayments |
|
|
1 | (13) |
|
|
|
|
|
|
Jordi Herrera-Joancomarti |
|
|
|
|
|
Money Conservation via Atomicity in Fair Off-Line E-Cash |
|
|
14 | (18) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Engineering an eCash System |
|
|
32 | (5) |
|
|
|
|
|
|
|
|
|
|
| Electronic Payment and Unlinkability |
|
|
Unlinkable Electronic Coupon Protocol with Anonymity Control |
|
|
37 | (10) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives |
|
|
47 | (5) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Secure Software Components, Mobile Agents, and Authentication |
|
|
Security Properties of Software Components |
|
|
52 | (5) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Methods for Protecting a Mobile Agent's Route |
|
|
57 | (15) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Non-interactive Cryptosystem for Entity Authentication |
|
|
72 | (13) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Network Security |
|
|
Implementation of Virtual Private Networks at the Transport Layer |
|
|
85 | (18) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree |
|
|
103 | (15) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks |
|
|
118 | (18) |
|
|
|
|
|
|
|
|
|
|
| Digital Watermarking |
|
|
Highly Robust Image Watermaking Using Complementary Modulations |
|
|
136 | (18) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Region-Based Watermarking for Images |
|
|
154 | (13) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Digital Watermarking Robust Against JPEG Compression |
|
|
167 | (11) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Protection of Software and Data |
|
|
Fingerprints for Copyright Software Protection |
|
|
178 | (13) |
|
|
|
|
|
|
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption |
|
|
191 | (11) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Electronic Money, Key Recovery, and Electronic Voting |
|
|
On Anonymous Electronic Cash and Crime |
|
|
202 | (5) |
|
|
|
|
|
|
|
|
|
|
|
On the Difficulty of Key Recovery Systems |
|
|
207 | (18) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
An Improvement on a Practical Secret Voting Scheme |
|
|
225 | (10) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Digital Signatures |
|
|
Undeniable Confirmer Signature |
|
|
235 | (12) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Extended Proxy Signatures for Smart Cards |
|
|
247 | (12) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures |
|
|
259 | (12) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Cryptanalysis of Two Group Signature Schemes |
|
|
271 | (6) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Author Index |
|
277 | |