Muutke küpsiste eelistusi

E-raamat: Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings

Edited by , Edited by , Edited by
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 1975
  • Ilmumisaeg: 31-Jul-2003
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540444565
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 1975
  • Ilmumisaeg: 31-Jul-2003
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540444565
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The third International Workshop on Information Security was held at the U- versity of Wollongong, Australia. The conference was sponsored by the Centre for Computer Security Research, University of Wollongong. The main themes of the conference were the newly emerging issues of Information Security. Mul- media copyright protection and security aspects of e-commerce were two topics that clearly re ect the focus of the conference. Protection of the copyright of electronic documents seems to be driven by strong practical demand from the industry for new, e cient and secure solutions. Although e-commerce is already booming, it has not reached its full potential in terms of new, e cient and secure e-commerce protocols with added properties. There were 63 papers submitted to the conference. The program committee accepted 23. Of those accepted, six papers were from Australia, ve from Japan, two each from Spain, Germany and the USA, and one each from Finland and Sweden. Four papers were co-authored by international teams from Canada and China, Korea and Australia, Taiwan and Australia, and Belgium, France and Germany, respectively. Final versions of the accepted papers were gathered using computing and other resources of the Institute of Mathematics, Polish Academy of Sciences, Warsaw, Poland. We are especially grateful to Jerzy Urbanowicz and Andrzej Pokrzywa for their help during preparation of the proceedings.

Muu info

Springer Book Archives
Multimedia Copyright Protection A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients 1(14) Minoru Kuribayashi Hatsukazu Tanaka Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models 15(15) Oliver Benedens A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection 30(14) Rene Rosenbaum Heidrun Schumann Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling 44(10) Francesc Sebe Josep Domingo-Ferrer Jordi Herrera Region-Based Watermarking by Distribution Adjustment 54(15) Gareth Brisbane Rei Safavi-Naini Philip Ogunbona Hiding Information in Color Images Using Small Color Palettes 69(13) Tapio Seppanen Kaisu Makela Anja Keskinarkaus An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software 82(15) Hideaki Goto Masahiro Mambo Kenjiro Matsumura Hiroki Shizuya Characteristics of Some Binary Codes for Fingerprinting 97(11) Tina Lindkvist E-Commerce An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees 108(13) Kazumasa Omote Atsuko Miyaji Unlinkable Divisible Electronic Cash 121(14) Toru Nakanishi Yuji Sugiyama Weighted One-Way Hash Chain and Its Applications 135(14) Sung-Ming Yen Yuliang Zheng Linkability in Practical Electronic Cash Design 149(15) Greg Maitland Jason Reid Ernest Foo Colin Boyd Ed Dawson Towards a Practical Secure Framework for Mobile Code Commerce 164(15) Gael Hachez Laurent Dein Hollander Mehrdad Jalali Jean-Jacques Quisquater Christophe Vasserot Key Management Probabilistic Methods in Multicast Key Management 179(15) Ali Aydin Selcuk Deepinder Sidhu Classification of Authentication Protocols: A Practical Approach 194(15) DongGook Park Colin Boyd Ed Dawson Exploring Fair Exchange Protocols Using Specification Animation 209(15) Colin Boyd Peter Kearney A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation 224(13) Daisuke Nojiri Goichiro Hanaoka Hideki Imai Network Security and Access Control An Efficient Protocol for Certified Electronic Mail 237(12) Josep Lluis Ferrer-Gomila Magdalena Payeras-Capella Llorenc Huguet i Rotger Performance Analysis of Secure Web Server Based on SSL 249(13) Xiaodong Lin Johnny W. Wong Weidong Kou Sherlock: Commercial High Assurance Network Computing 262(15) Stephen P. Morgan Stephen W. Neal Melissa A. Hartman Matthew R. Laue The Role of the Development Process in Operating System Security 277(15) Christian Payne Cryptographic Systems Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization 292(16) Rei Safavi-Naini Willy Susilo A Signcryption Scheme Based on Integer Factorization 308(15) Ron Steinfeld Yuliang Zheng Author Index 323