


default search action
3. ISW 2000: NSW, Australia
- Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry:

Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings. Lecture Notes in Computer Science 1975, Springer 2000, ISBN 3-540-41416-9
Multimedia Copyright Protection
- Minoru Kuribayashi

, Hatsukazu Tanaka:
A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients. 1-14 - Oliver Benedens:

Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models. 15-29 - René Rosenbaum, Heidrun Schumann:

A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection. 30-43 - Francesc Sebé, Josep Domingo-Ferrer, Jordi Herrera-Joancomartí

:
Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling. 44-53 - Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona

:
Region-Based Watermarking by Distribution Adjustment. 54-68 - Tapio Seppänen, Kaisu Mäkelä, Anja Keskinarkaus:

Hiding Information in Color Images Using Small Color Palettes. 69-81 - Hideaki Goto, Masahiro Mambo, Kenjiro Matsumura, Hiroki Shizuya:

An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software. 82-96 - Tina Lindkvist:

Characteristics of Some Binary Codes for Fingerprinting. 97-107
E-Commerce
- Kazumasa Omote, Atsuko Miyaji

:
An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees. 108-120 - Toru Nakanishi, Yuji Sugiyama:

Unlinkable Divisible Electronic Cash. 121-134 - Sung-Ming Yen, Yuliang Zheng:

Weighted One-Way Hash Chain and Its Applications. 135-148 - Greg Maitland, Jason Reid, Ernest Foo

, Colin Boyd, Ed Dawson:
Linkability in Practical Electronic Cash Design. 149-163 - Gaël Hachez, Laurent Den Hollander, Mehrdad Jalali, Jean-Jacques Quisquater, Christophe Vasserot:

Towards a Practical Secure Framework for Mobile Code Commerce. 164-178
Key Management
- Ali Aydin Selçuk, Deepinder P. Sidhu:

Probabilistic Methods in Multicast Key Management. 179-193 - DongGook Park, Colin Boyd, Ed Dawson:

Classification of Authentication Protocols: A Practical Approach. 194-208 - Colin Boyd, Peter Kearney:

Exploring Fair Exchange Protocols Using Specification Animation. 209-223 - Daisuke Nojiri, Goichiro Hanaoka, Hideki Imai:

A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation. 224-236
Network Security and Access Control
- Josep Lluís Ferrer-Gomila

, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger:
An Efficient Protocol for Certified Electronic Mail. 237-248 - Xiaodong Lin, Johnny W. Wong, Weidong Kou:

Performance Analysis of Secure Web Server Based on SSL. 249-261 - Stephen P. Morgan, Stephen W. Neal, Melissa A. Hartman, Matthew R. Laue:

Sherlock: Commercial High Assurance Network Computing. 262-276 - Christian Payne:

The Role of the Development Process in Operating System Security. 277-291
Cryptographic Systems
- Reihaneh Safavi-Naini, Willy Susilo

:
Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. 292-307 - Ron Steinfeld, Yuliang Zheng

:
A Signcryption Scheme Based on Integer Factorization. 308-322

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














