Cantitate/Preț
Produs

Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings: Lecture Notes in Computer Science, cartea 1729

Editat de Masahiro Mambo, Yuliang Zheng
en Limba Engleză Paperback – 20 oct 1999

Din seria Lecture Notes in Computer Science

Preț: 38813 lei

Nou

Puncte Express: 582

Preț estimativ în valută:
7430 7753$ 6229£

Carte tipărită la comandă

Livrare economică 12-26 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540666950
ISBN-10: 3540666958
Pagini: 296
Ilustrații: X, 286 p.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.42 kg
Ediția:1999
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Electronic Money.- Spending Programs: A Tool for Flexible Micropayments.- Money Conservation via Atomicity in Fair Off-Line E-Cash.- Engineering an eCash System.- Electronic Payment and Unlinkability.- Unlinkable Electronic Coupon Protocol with Anonymity Control.- On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives.- Secure Software Components, Mobile Agents, and Authentication.- Security Properties of Software Components.- Methods for Protecting a Mobile Agent’s Route.- Non-interactive Cryptosystem for Entity Authentication.- Network Security.- Implementation of Virtual Private Networks at the Transport Layer.- Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree.- Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks.- Digital Watermarking.- Highly Robust Image Watermarking Using Complementary Modulations.- Region-Based Watermarking for Images.- Digital Watermarking Robust Against JPEG Compression.- Protection of Software and Data.- Fingerprints for Copyright Software Protection.- A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption.- Electronic Money, Key Recovery, and Electronic Voting.- On Anonymous Electronic Cash and Crime.- On the Difficulty of Key Recovery Systems.- An Improvement on a Practical Secret Voting Scheme.- Digital Signatures.- Undeniable Confirmer Signature.- Extended Proxy Signatures for Smart Cards.- A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.- Cryptanalysis of Two Group Signature Schemes.

Caracteristici

Includes supplementary material: sn.pub/extras