Research Catalog

Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings

Title
Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings / Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry (eds.).
Author
ISW (Workshop : Information security) (3rd : 2000 : Wollongong, N.S.W.)
Publication
New York : Springer, 2000.

Items in the Library & Off-site

Filter by

1 Item

StatusFormatAccessCall NumberItem Location
TextRequest in advance QA76.9.A25 I89 2000Off-site

Holdings

Details

Additional Authors
  • Pieprzyk, Josef, 1949-
  • Okamoto, Eiji.
  • Seberry, Jennifer, 1944-
Description
x, 322 pages : illustrations; 24 cm.
Series Statement
Lecture notes in computer science ; 1975
Uniform Title
Lecture notes in computer science ; 1975.
Subject
  • Computer security > Congresses
  • Computers > Access control > Congresses
Bibliography (note)
  • Includes bibliographical references and index.
Contents
A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients / Minoru Kuribayashi and Hatsukazu Tanaka -- Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models / Oliver Benedens -- A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection / Rene Rosenbaum and Heidrun Schumann -- Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling / Francesc Sebe, Josep Domingo-Ferrer and Jordi Herrera -- Region-Based Watermarking by Distribution Adjustment / Gareth Brisbane, Rei Safavi-Naini and Philip Ogunbona -- Hiding Information in Color Images Using Small Color Palettes / Tapio Seppanen, Kaisu Makela and Anja Keskinarkaus -- An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software / Hideaki Goto, Masahiro Mambo and Kenjiro Matsumura / [et al.] -- Characteristics of Some Binary Codes for Fingerprinting / Tina Lindkvist -- An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees / Kazumasa Omote and Atsuko Miyaji -- Unlinkable Divisible Electronic Cash / Toru Nakanishi and Yuji Sugiyama -- Weighted One-Way Hash Chain and Its Applications / Sung-Ming Yen and Yuliang Zheng -- Linkability in Practical Electronic Cash Design / Greg Maitland, Jason Reid and Ernest Foo / [et al.] -- Towards a Practical Secure Framework for Mobile Code Commerce / Gael Hachez, Laurent Den Hollander and Mehrdad Jalali / [et al.] -- Probabilistic Methods in Multicast Key Management / Ali Aydin Selcuk and Deepinder Sidhu -- Classification of Authentication Protocols: A Practical Approach / DongGook Park, Colin Boyd and Ed Dawson -- Exploring Fair Exchange Protocols Using Specification Animation / Colin Boyd and Peter Kearney -- A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation / Daisuke Nojiri, Goichiro Hanaoka and Hideki Imai -- An Efficient Protocol for Certified Electronic Mail / Josep Lluis Ferrer-Gomila, Magdalena Payeras-Capella and Llorenc Huguet i Rotger -- Performance Analysis of Secure Web Server Based on SSL / Xiaodong Lin, Johnny W. Wong and Weidong Kou -- Sherlock: Commercial High Assurance Network Computing / Stephen P. Morgan, Stephen W. Neal and Melissa A. Hartman / [et al.] -- The Role of the Development Process in Operating System Security / Christian Payne -- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization / Rei Safavi-Naini and Willy Susilo -- A Signcryption Scheme Based on Integer Factorization / Ron Steinfeld and Yuliang Zheng.
ISBN
3540414169 (softcover : alk. paper)
LCCN
00066064
OCLC
  • 505754958
  • ocn505754958
  • SCSB-4039444
Owning Institutions
Columbia University Libraries