


default search action
2. ISW 1999: Kuala Lumpur, Malaysia
- Masahiro Mambo, Yuliang Zheng:
Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings. Lecture Notes in Computer Science 1729, Springer 1999, ISBN 3-540-66695-8
Electronic Money
- Josep Domingo-Ferrer, Jordi Herrera-Joancomartí
:
Spending Programs: A Tool for Flexible Micropayments. 1-13 - Shouhuai Xu, Moti Yung, Gendu Zhang, Hong Zhu:
Money Conservation via Atomicity in Fair Off-Line E-Cash. 14-31 - Tim Ebringer, Peter Thorne:
Engineering an eCash System. 32-36
Electronic Payment and Unlinkability
- Toru Nakanishi, Nobuaki Haruna, Yuji Sugiyama:
Unlinkable Electronic Coupon Protocol with Anonymity Control. 37-46 - Marc Joye, Narn-Yih Lee, Tzonelih Hwang:
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives. 47-51
Secure Software Components, Mobile Agents, and Authentication
- Khaled M. Khan
, Jun Han, Yuliang Zheng
:
Security Properties of Software Components. 52-56 - Dirk Westhoff, Markus Schneider, Claus Unger, Firoz Kaderali:
Methods for Protecting a Mobile Agent's Route. 57-71 - Hyung-Woo Lee, Jung-Eun Kim, Tai-Yun Kim:
Non-interactive Cryptosystem for Entity Authentication. 72-84
Network Security
- Jorge Dávila, Javier López, René Peralta
:
Implementation of Virtual Private Networks at the Transport Layer. 85-102 - Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi:
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree. 103-117 - Yuji Watanabe, Hideki Imai:
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks. 118-135
Digital Watermarking
- Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang
, Chwen-Jye Sze:
Highly Robust Image Watermarking Using Complementary Modulations. 136-153 - Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona
:
Region-Based Watermarking for Images. 154-166 - Hye-Joo Lee, Ji-Hwan Park, Yuliang Zheng
:
Digital Watermarking Robust Against JPEG Compression. 167-190
Protection of Software and Data
- Josef Pieprzyk
:
Fingerprints for Copyright Software Protection. 178-190 - Sang-Uk Shin, Kyeong Seop Sim, Kyung Hyune Rhee:
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption. 191-201
Electronic Money, Key Recovery, and Electronic Voting
- Tomas Sander, Amnon Ta-Shma
:
On Anonymous Electronic Cash and Crime. 202-206 - Seungjoo Kim
, Insoo Lee, Masahiro Mambo, Sungjun Park:
On the Difficulty of Key Recovery Systems. 207-224 - Miyako Ohkubo, Fumiaki Miura, Masayuki Abe, Atsushi Fujioka, Tatsuaki Okamoto:
An Improvement on a Practical Secret Voting Scheme. 225-234
Digital Signatures
- Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan:
Undeniable Confirmer Signature. 235-246 - Takeshi Okamoto, Mitsuru Tada, Eiji Okamoto:
Extended Proxy Signatures for Smart Cards. 247-258 - Tsuyoshi Nishioka, Goichiro Hanaoka, Hideki Imai:
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. 259-270 - Marc Joye, Seungjoo Kim
, Narn-Yih Lee:
Cryptanalysis of Two Group Signature Schemes. 271-275

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.