图书介绍

Information security Second International Workshop2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

Information security Second International Workshop
  • ISW99 著
  • 出版社: Kuala Lumpur
  • ISBN:
  • 出版时间:未知
  • 标注页数:0页
  • 文件大小:39MB
  • 文件页数:293页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

Information security Second International WorkshopPDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Electronic Money1

Spending Programs:A Tool for Flexible Micropayments&Josep Domingo-Ferrer and Jordi Herrera-Joancomarti (Uni Rovira iVirgili,Spain)1

Money Conservation via Atomicity in Fair Off-Line E-Cash&Shouhuai Xu (Fudan Univ.,P.R.China),Moti Yung (CertCo,USA),Gendu Zhang,and Hong Zhu (Fudan Univ.,P.R.China)14

Engineering an eCash System&Tim Ebringer and Peter Thorne (Univ.of Melbourne,Australia)32

Electronic Payment and Unlinkability37

Unlinkable Electronic Coupon Protocol with Anonymity Control&Toru Nakanishi,Nobuaki Haruna,and Yuji Sugiyama (Okayama Univ.,Japan)37

On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives&Marc Joye (Gemplus,France),Narn-Yih Lee (Nan-Tai Inst.of Tech.,Taiwan,R.O.C.),and Tzonelih Hwang (Cheng-Kung Univ.,Taiwan,R.O.C.)47

Secure Software Components,Mobile Agents,and Authentication52

Security Properties of Software Components&Khaled Khan,Jun Han,and Yuliang Zheng (Monash Univ.,Australia)52

Methods for Protecting a Mobile Agent’s Route&Dirk Westhoff,Markus Schneider,Claus Unger,and Firoz Kaderali(Fern Uni.Hagen,Germany)57

Non-interactive Cryptosystem for Entity Authentication&Hyung-Woo Lee (Chonan Univ.,Korea),Jung-Eun Kim,andTai- Yun Kim (Korea Univ.,Korea)72

Network Security85

Implementation of Virtual Private Networks at the Transport Layer&Jorge Davila (Uni Politecnica de Madrid,Spain),Javier Lopez (Uni de Malaga,Spain),and Rene Peralta (Univ.of Wisconsin-Milwaukee,USA)85

Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree&Hiroaki Kikuchi,Kensuke Abe,and Shohachiro Nakanishi (Tokai Univ.,Japan)103

Active Rebooting Method for Proactivized System:How to Enhance the Security against Latent Virus Attacks&Yuji Watanabe and Hideki Imai (Univ.of Tokyo,Japan)118

Digital Watermarking136

Highly Robust Image Watermarking Using Complementary Modulations&Chun-Shien Lu,Hong- Yuan Mark Liao,Shih-Kun Huang,and Chwen-Jye Sze (Academia Sinica,Taiwan,R.O.C.)136

Region-Based Watermarking for Images&Gareth Brisbane,Rei Safavi-Naini (Wollongong,Australia),and Philip Ogunbona (Motorola Australian Research Center,Australia)154

Digital Watermarking Robust Against JPEG Compression&Hye-Joo Lee,Ji-Hwan Park (PuKyong Nat’l Univ.,Korea),and Yuliang Zheng (Monash Univ.,Australia)167

Protection of Software and Data178

Fingerprints for Copyright Software Protection&Josef Pieprzyk (Univ.of Wollongong,Australia)178

A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption&Sang Uk Shin,Kyeong Seop Sim,and Kyung Hyune Rhee (PuKyong Nat’l Univ.,Korea)191

Electronic Money,Key Recovery,and Electronic Voting202

On Anonymous Electronic Cash and Crime&Tomas Sander and Amnon Ta-Shma (Int’l Computer Science Inst.,USA)202

On the Difficulty of Key Recovery Systems&Seungjoo Kim,Insoo Lee (KISA,Korea),Masahiro Mambo (Tohoku Univ.,Japan),and Sungjun Park (KISA,Korea)207

An Improvement on a Practical Secret Voting Scheme&Miyako Ohkubo,Fumiaki Miura,Masayuki Abe,Atsushi Fujioka,and Tatsuaki Okamoto (NTT Inf.Sharing Platform Lab.,Japan)225

Digital Signatures235

Undeniable Confirmer Signature&Khanh Nguyen,Yi Mu,and Vijay Varadharajan (Univ.of Western Sydney,Australia)235

Extended Proxy Signatures for Smart Cards&Takeshi Okamoto,Mitsuru Tada (JAIST,Japan),and Eiji Okamoto (Univ.of Wisconsin-Milwaukee,USA)247

A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures&Tsuyoshi Nishioka (Mitsubishi Electric Corp.,Japan),Goichiro Hanaoka,and Hideki Imai (Univ.of Tokyo,Japan)259

Cryptanalysis of Two Group Signature Schemes&Marc Joye (Gemplus,France),Seungjoo Kim (KISA,Korea),and Narn-Yih Lee (Nan-Tai Inst.of Tech.,Taiwan,R.O.C.)271

Author Index277

热门推荐