


default search action
3. ISW 2000: NSW, Australia
- Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry:
Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings. Lecture Notes in Computer Science 1975, Springer 2000, ISBN 3-540-41416-9
Multimedia Copyright Protection
- Minoru Kuribayashi
, Hatsukazu Tanaka:
A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients. 1-14 - Oliver Benedens:
Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models. 15-29 - René Rosenbaum, Heidrun Schumann:
A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection. 30-43 - Francesc Sebé, Josep Domingo-Ferrer, Jordi Herrera-Joancomartí
:
Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling. 44-53 - Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona
:
Region-Based Watermarking by Distribution Adjustment. 54-68 - Tapio Seppänen, Kaisu Mäkelä, Anja Keskinarkaus:
Hiding Information in Color Images Using Small Color Palettes. 69-81 - Hideaki Goto, Masahiro Mambo, Kenjiro Matsumura, Hiroki Shizuya:
An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software. 82-96 - Tina Lindkvist:
Characteristics of Some Binary Codes for Fingerprinting. 97-107
E-Commerce
- Kazumasa Omote, Atsuko Miyaji
:
An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees. 108-120 - Toru Nakanishi, Yuji Sugiyama:
Unlinkable Divisible Electronic Cash. 121-134 - Sung-Ming Yen, Yuliang Zheng:
Weighted One-Way Hash Chain and Its Applications. 135-148 - Greg Maitland, Jason Reid, Ernest Foo
, Colin Boyd, Ed Dawson:
Linkability in Practical Electronic Cash Design. 149-163 - Gaël Hachez, Laurent Den Hollander, Mehrdad Jalali, Jean-Jacques Quisquater, Christophe Vasserot:
Towards a Practical Secure Framework for Mobile Code Commerce. 164-178
Key Management
- Ali Aydin Selçuk, Deepinder P. Sidhu:
Probabilistic Methods in Multicast Key Management. 179-193 - DongGook Park, Colin Boyd, Ed Dawson:
Classification of Authentication Protocols: A Practical Approach. 194-208 - Colin Boyd, Peter Kearney:
Exploring Fair Exchange Protocols Using Specification Animation. 209-223 - Daisuke Nojiri, Goichiro Hanaoka, Hideki Imai:
A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation. 224-236
Network Security and Access Control
- Josep Lluís Ferrer-Gomila
, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger:
An Efficient Protocol for Certified Electronic Mail. 237-248 - Xiaodong Lin, Johnny W. Wong, Weidong Kou:
Performance Analysis of Secure Web Server Based on SSL. 249-261 - Stephen P. Morgan, Stephen W. Neal, Melissa A. Hartman, Matthew R. Laue:
Sherlock: Commercial High Assurance Network Computing. 262-276 - Christian Payne:
The Role of the Development Process in Operating System Security. 277-291
Cryptographic Systems
- Reihaneh Safavi-Naini, Willy Susilo
:
Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. 292-307 - Ron Steinfeld, Yuliang Zheng
:
A Signcryption Scheme Based on Integer Factorization. 308-322

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.