图书介绍
Information security Second International Workshop2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

- ISW99 著
- 出版社: Kuala Lumpur
- ISBN:
- 出版时间:未知
- 标注页数:0页
- 文件大小:39MB
- 文件页数:293页
- 主题词:
PDF下载
下载说明
Information security Second International WorkshopPDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Electronic Money1
Spending Programs:A Tool for Flexible Micropayments&Josep Domingo-Ferrer and Jordi Herrera-Joancomarti (Uni Rovira iVirgili,Spain)1
Money Conservation via Atomicity in Fair Off-Line E-Cash&Shouhuai Xu (Fudan Univ.,P.R.China),Moti Yung (CertCo,USA),Gendu Zhang,and Hong Zhu (Fudan Univ.,P.R.China)14
Engineering an eCash System&Tim Ebringer and Peter Thorne (Univ.of Melbourne,Australia)32
Electronic Payment and Unlinkability37
Unlinkable Electronic Coupon Protocol with Anonymity Control&Toru Nakanishi,Nobuaki Haruna,and Yuji Sugiyama (Okayama Univ.,Japan)37
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives&Marc Joye (Gemplus,France),Narn-Yih Lee (Nan-Tai Inst.of Tech.,Taiwan,R.O.C.),and Tzonelih Hwang (Cheng-Kung Univ.,Taiwan,R.O.C.)47
Secure Software Components,Mobile Agents,and Authentication52
Security Properties of Software Components&Khaled Khan,Jun Han,and Yuliang Zheng (Monash Univ.,Australia)52
Methods for Protecting a Mobile Agent’s Route&Dirk Westhoff,Markus Schneider,Claus Unger,and Firoz Kaderali(Fern Uni.Hagen,Germany)57
Non-interactive Cryptosystem for Entity Authentication&Hyung-Woo Lee (Chonan Univ.,Korea),Jung-Eun Kim,andTai- Yun Kim (Korea Univ.,Korea)72
Network Security85
Implementation of Virtual Private Networks at the Transport Layer&Jorge Davila (Uni Politecnica de Madrid,Spain),Javier Lopez (Uni de Malaga,Spain),and Rene Peralta (Univ.of Wisconsin-Milwaukee,USA)85
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree&Hiroaki Kikuchi,Kensuke Abe,and Shohachiro Nakanishi (Tokai Univ.,Japan)103
Active Rebooting Method for Proactivized System:How to Enhance the Security against Latent Virus Attacks&Yuji Watanabe and Hideki Imai (Univ.of Tokyo,Japan)118
Digital Watermarking136
Highly Robust Image Watermarking Using Complementary Modulations&Chun-Shien Lu,Hong- Yuan Mark Liao,Shih-Kun Huang,and Chwen-Jye Sze (Academia Sinica,Taiwan,R.O.C.)136
Region-Based Watermarking for Images&Gareth Brisbane,Rei Safavi-Naini (Wollongong,Australia),and Philip Ogunbona (Motorola Australian Research Center,Australia)154
Digital Watermarking Robust Against JPEG Compression&Hye-Joo Lee,Ji-Hwan Park (PuKyong Nat’l Univ.,Korea),and Yuliang Zheng (Monash Univ.,Australia)167
Protection of Software and Data178
Fingerprints for Copyright Software Protection&Josef Pieprzyk (Univ.of Wollongong,Australia)178
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption&Sang Uk Shin,Kyeong Seop Sim,and Kyung Hyune Rhee (PuKyong Nat’l Univ.,Korea)191
Electronic Money,Key Recovery,and Electronic Voting202
On Anonymous Electronic Cash and Crime&Tomas Sander and Amnon Ta-Shma (Int’l Computer Science Inst.,USA)202
On the Difficulty of Key Recovery Systems&Seungjoo Kim,Insoo Lee (KISA,Korea),Masahiro Mambo (Tohoku Univ.,Japan),and Sungjun Park (KISA,Korea)207
An Improvement on a Practical Secret Voting Scheme&Miyako Ohkubo,Fumiaki Miura,Masayuki Abe,Atsushi Fujioka,and Tatsuaki Okamoto (NTT Inf.Sharing Platform Lab.,Japan)225
Digital Signatures235
Undeniable Confirmer Signature&Khanh Nguyen,Yi Mu,and Vijay Varadharajan (Univ.of Western Sydney,Australia)235
Extended Proxy Signatures for Smart Cards&Takeshi Okamoto,Mitsuru Tada (JAIST,Japan),and Eiji Okamoto (Univ.of Wisconsin-Milwaukee,USA)247
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures&Tsuyoshi Nishioka (Mitsubishi Electric Corp.,Japan),Goichiro Hanaoka,and Hideki Imai (Univ.of Tokyo,Japan)259
Cryptanalysis of Two Group Signature Schemes&Marc Joye (Gemplus,France),Seungjoo Kim (KISA,Korea),and Narn-Yih Lee (Nan-Tai Inst.of Tech.,Taiwan,R.O.C.)271
Author Index277
热门推荐
- 3384824.html
- 964649.html
- 3311640.html
- 820489.html
- 926516.html
- 1006396.html
- 1143019.html
- 3044662.html
- 2157720.html
- 1032499.html
- http://www.ickdjs.cc/book_2800509.html
- http://www.ickdjs.cc/book_2068014.html
- http://www.ickdjs.cc/book_3600028.html
- http://www.ickdjs.cc/book_3669804.html
- http://www.ickdjs.cc/book_3278615.html
- http://www.ickdjs.cc/book_2144912.html
- http://www.ickdjs.cc/book_2765018.html
- http://www.ickdjs.cc/book_1623534.html
- http://www.ickdjs.cc/book_2764907.html
- http://www.ickdjs.cc/book_2680143.html