


default search action
2. ISW 1999: Kuala Lumpur, Malaysia
- Masahiro Mambo, Yuliang Zheng:

Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings. Lecture Notes in Computer Science 1729, Springer 1999, ISBN 3-540-66695-8
Electronic Money
- Josep Domingo-Ferrer, Jordi Herrera-Joancomartí

:
Spending Programs: A Tool for Flexible Micropayments. 1-13 - Shouhuai Xu, Moti Yung, Gendu Zhang, Hong Zhu:

Money Conservation via Atomicity in Fair Off-Line E-Cash. 14-31 - Tim Ebringer, Peter Thorne:

Engineering an eCash System. 32-36
Electronic Payment and Unlinkability
- Toru Nakanishi, Nobuaki Haruna, Yuji Sugiyama:

Unlinkable Electronic Coupon Protocol with Anonymity Control. 37-46 - Marc Joye, Narn-Yih Lee, Tzonelih Hwang:

On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives. 47-51
Secure Software Components, Mobile Agents, and Authentication
- Khaled M. Khan

, Jun Han, Yuliang Zheng
:
Security Properties of Software Components. 52-56 - Dirk Westhoff, Markus Schneider, Claus Unger, Firoz Kaderali:

Methods for Protecting a Mobile Agent's Route. 57-71 - Hyung-Woo Lee, Jung-Eun Kim, Tai-Yun Kim:

Non-interactive Cryptosystem for Entity Authentication. 72-84
Network Security
- Jorge Dávila, Javier López, René Peralta

:
Implementation of Virtual Private Networks at the Transport Layer. 85-102 - Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi:

Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree. 103-117 - Yuji Watanabe, Hideki Imai:

Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks. 118-135
Digital Watermarking
- Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang

, Chwen-Jye Sze:
Highly Robust Image Watermarking Using Complementary Modulations. 136-153 - Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona

:
Region-Based Watermarking for Images. 154-166 - Hye-Joo Lee, Ji-Hwan Park, Yuliang Zheng

:
Digital Watermarking Robust Against JPEG Compression. 167-190
Protection of Software and Data
- Josef Pieprzyk

:
Fingerprints for Copyright Software Protection. 178-190 - Sang-Uk Shin, Kyeong Seop Sim, Kyung Hyune Rhee:

A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption. 191-201
Electronic Money, Key Recovery, and Electronic Voting
- Tomas Sander, Amnon Ta-Shma

:
On Anonymous Electronic Cash and Crime. 202-206 - Seungjoo Kim

, Insoo Lee, Masahiro Mambo, Sungjun Park:
On the Difficulty of Key Recovery Systems. 207-224 - Miyako Ohkubo, Fumiaki Miura, Masayuki Abe, Atsushi Fujioka, Tatsuaki Okamoto:

An Improvement on a Practical Secret Voting Scheme. 225-234
Digital Signatures
- Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan:

Undeniable Confirmer Signature. 235-246 - Takeshi Okamoto, Mitsuru Tada, Eiji Okamoto:

Extended Proxy Signatures for Smart Cards. 247-258 - Tsuyoshi Nishioka, Goichiro Hanaoka, Hideki Imai:

A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. 259-270 - Marc Joye, Seungjoo Kim

, Narn-Yih Lee:
Cryptanalysis of Two Group Signature Schemes. 271-275

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














