Research Catalog
Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings
- Title
- Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings / Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry (eds.).
- Author
- ISW (Workshop : Information security) (3rd : 2000 : Wollongong, N.S.W.)
- Publication
- New York : Springer, 2000.
Items in the Library & Off-site
Filter by
1 Item
Status | Format | Access | Call Number | Item Location |
---|---|---|---|---|
Text | Request in advance | QA76.9.A25 I89 2000 | Off-site |
Holdings
Details
- Additional Authors
- Description
- x, 322 pages : illustrations; 24 cm.
- Series Statement
- Lecture notes in computer science ; 1975
- Uniform Title
- Lecture notes in computer science ; 1975.
- Subject
- Bibliography (note)
- Includes bibliographical references and index.
- Contents
- A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients / Minoru Kuribayashi and Hatsukazu Tanaka -- Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models / Oliver Benedens -- A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection / Rene Rosenbaum and Heidrun Schumann -- Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling / Francesc Sebe, Josep Domingo-Ferrer and Jordi Herrera -- Region-Based Watermarking by Distribution Adjustment / Gareth Brisbane, Rei Safavi-Naini and Philip Ogunbona -- Hiding Information in Color Images Using Small Color Palettes / Tapio Seppanen, Kaisu Makela and Anja Keskinarkaus -- An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software / Hideaki Goto, Masahiro Mambo and Kenjiro Matsumura / [et al.] -- Characteristics of Some Binary Codes for Fingerprinting / Tina Lindkvist -- An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees / Kazumasa Omote and Atsuko Miyaji -- Unlinkable Divisible Electronic Cash / Toru Nakanishi and Yuji Sugiyama -- Weighted One-Way Hash Chain and Its Applications / Sung-Ming Yen and Yuliang Zheng -- Linkability in Practical Electronic Cash Design / Greg Maitland, Jason Reid and Ernest Foo / [et al.] -- Towards a Practical Secure Framework for Mobile Code Commerce / Gael Hachez, Laurent Den Hollander and Mehrdad Jalali / [et al.] -- Probabilistic Methods in Multicast Key Management / Ali Aydin Selcuk and Deepinder Sidhu -- Classification of Authentication Protocols: A Practical Approach / DongGook Park, Colin Boyd and Ed Dawson -- Exploring Fair Exchange Protocols Using Specification Animation / Colin Boyd and Peter Kearney -- A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation / Daisuke Nojiri, Goichiro Hanaoka and Hideki Imai -- An Efficient Protocol for Certified Electronic Mail / Josep Lluis Ferrer-Gomila, Magdalena Payeras-Capella and Llorenc Huguet i Rotger -- Performance Analysis of Secure Web Server Based on SSL / Xiaodong Lin, Johnny W. Wong and Weidong Kou -- Sherlock: Commercial High Assurance Network Computing / Stephen P. Morgan, Stephen W. Neal and Melissa A. Hartman / [et al.] -- The Role of the Development Process in Operating System Security / Christian Payne -- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization / Rei Safavi-Naini and Willy Susilo -- A Signcryption Scheme Based on Integer Factorization / Ron Steinfeld and Yuliang Zheng.
- ISBN
- 3540414169 (softcover : alk. paper)
- LCCN
- 00066064
- OCLC
- 505754958
- ocn505754958
- SCSB-4039444
- Owning Institutions
- Columbia University Libraries