Atjaunināt sīkdatņu piekrišanu

E-grāmata: Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings

Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 1975
  • Izdošanas datums: 31-Jul-2003
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540444565
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 1975
  • Izdošanas datums: 31-Jul-2003
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540444565
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The third International Workshop on Information Security was held at the U- versity of Wollongong, Australia. The conference was sponsored by the Centre for Computer Security Research, University of Wollongong. The main themes of the conference were the newly emerging issues of Information Security. Mul- media copyright protection and security aspects of e-commerce were two topics that clearly re ect the focus of the conference. Protection of the copyright of electronic documents seems to be driven by strong practical demand from the industry for new, e cient and secure solutions. Although e-commerce is already booming, it has not reached its full potential in terms of new, e cient and secure e-commerce protocols with added properties. There were 63 papers submitted to the conference. The program committee accepted 23. Of those accepted, six papers were from Australia, ve from Japan, two each from Spain, Germany and the USA, and one each from Finland and Sweden. Four papers were co-authored by international teams from Canada and China, Korea and Australia, Taiwan and Australia, and Belgium, France and Germany, respectively. Final versions of the accepted papers were gathered using computing and other resources of the Institute of Mathematics, Polish Academy of Sciences, Warsaw, Poland. We are especially grateful to Jerzy Urbanowicz and Andrzej Pokrzywa for their help during preparation of the proceedings.

Papildus informācija

Springer Book Archives
Multimedia Copyright Protection A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients 1(14) Minoru Kuribayashi Hatsukazu Tanaka Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models 15(15) Oliver Benedens A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection 30(14) Rene Rosenbaum Heidrun Schumann Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling 44(10) Francesc Sebe Josep Domingo-Ferrer Jordi Herrera Region-Based Watermarking by Distribution Adjustment 54(15) Gareth Brisbane Rei Safavi-Naini Philip Ogunbona Hiding Information in Color Images Using Small Color Palettes 69(13) Tapio Seppanen Kaisu Makela Anja Keskinarkaus An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software 82(15) Hideaki Goto Masahiro Mambo Kenjiro Matsumura Hiroki Shizuya Characteristics of Some Binary Codes for Fingerprinting 97(11) Tina Lindkvist E-Commerce An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees 108(13) Kazumasa Omote Atsuko Miyaji Unlinkable Divisible Electronic Cash 121(14) Toru Nakanishi Yuji Sugiyama Weighted One-Way Hash Chain and Its Applications 135(14) Sung-Ming Yen Yuliang Zheng Linkability in Practical Electronic Cash Design 149(15) Greg Maitland Jason Reid Ernest Foo Colin Boyd Ed Dawson Towards a Practical Secure Framework for Mobile Code Commerce 164(15) Gael Hachez Laurent Dein Hollander Mehrdad Jalali Jean-Jacques Quisquater Christophe Vasserot Key Management Probabilistic Methods in Multicast Key Management 179(15) Ali Aydin Selcuk Deepinder Sidhu Classification of Authentication Protocols: A Practical Approach 194(15) DongGook Park Colin Boyd Ed Dawson Exploring Fair Exchange Protocols Using Specification Animation 209(15) Colin Boyd Peter Kearney A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation 224(13) Daisuke Nojiri Goichiro Hanaoka Hideki Imai Network Security and Access Control An Efficient Protocol for Certified Electronic Mail 237(12) Josep Lluis Ferrer-Gomila Magdalena Payeras-Capella Llorenc Huguet i Rotger Performance Analysis of Secure Web Server Based on SSL 249(13) Xiaodong Lin Johnny W. Wong Weidong Kou Sherlock: Commercial High Assurance Network Computing 262(15) Stephen P. Morgan Stephen W. Neal Melissa A. Hartman Matthew R. Laue The Role of the Development Process in Operating System Security 277(15) Christian Payne Cryptographic Systems Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization 292(16) Rei Safavi-Naini Willy Susilo A Signcryption Scheme Based on Integer Factorization 308(15) Ron Steinfeld Yuliang Zheng Author Index 323