skip to content
Information Security. Preview this item
ClosePreview this item

Information Security.

Author: Josef Pieprzyk; Eiji Okamoto; Jennifer Seberry
Publisher: Berlin ; London : Springer, 2000.
Series: Lecture notes in computer science, 1975.
Edition/Format:   eBook : Document : EnglishView all editions and formats

The third International Workshop on Information Security was held at the U- versity of Wollongong, Australia. Although e-commerce is already booming, it has not reached its full potential in terms of  Read more...


(not yet rated) 0 with reviews - Be the first.

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Josef Pieprzyk; Eiji Okamoto; Jennifer Seberry
ISBN: 3540414169 9783540414162 9783662188316 3662188317
OCLC Number: 243488295
Reproduction Notes: Electronic reproduction. SpringerLink.
Description: 1 online resource.
Details: Mode of access: World Wide Web.
Contents: Multimedia Copyright Protection.- A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients.- Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models.- A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection.- Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling.- Region-Based Watermarking by Distribution Adjustment.- Hiding Information in Color Images Using Small Color Palettes.- An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software.- Characteristics of Some Binary Codes for Fingerprinting.- E-Commerce.- An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees.- Unlinkable Divisible Electronic Cash.- Weighted One-Way Hash Chain and Its Applications.- Linkability in Practical Electronic Cash Design.- Towards a Practical Secure Framework for Mobile Code Commerce.- Key Management.- Probabilistic Methods in Multicast Key Management.- Classification of Authentication Protocols: A Practical Approach.- Exploring Fair Exchange Protocols Using Specification Animation.- A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation.- Network Security and Access Control.- An Efficient Protocol for Certified Electronic Mail.- Performance Analysis of Secure Web Server Based on SSL.- Sherlock: Commercial High Assurance Network Computing Extended Abstract.- The Role of the Development Process in Operating System Security.- Cryptographic Systems.- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization.- A Signcryption Scheme Based on Integer Factorization.
Series Title: Lecture notes in computer science, 1975.


User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data

Primary Entity

<> # Information Security.
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "243488295" ;
    library:placeOfPublication <> ; # London
    library:placeOfPublication <> ;
    library:placeOfPublication <> ; # Berlin
    schema:bookFormat schema:EBook ;
    schema:contributor <> ; # Eiji Okamoto
    schema:contributor <> ; # Josef Pieprzyk
    schema:contributor <> ; # Jennifer Seberry
    schema:datePublished "2000" ;
    schema:exampleOfWork <> ;
    schema:inLanguage "en" ;
    schema:isPartOf <> ; # Lecture notes in computer science ;
    schema:name "Information Security."@en ;
    schema:productID "243488295" ;
    schema:publication <> ;
    schema:publisher <> ; # Springer
    schema:url <> ;
    schema:url <> ;
    schema:workExample <> ;
    schema:workExample <> ;
    wdrs:describedby <> ;

Related Entities

<> # London
    a schema:Place ;
    schema:name "London" ;

<> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <> ; # Information Security.
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture Notes in Computer Science ;" ;

<> # Jennifer Seberry
    a schema:Person ;
    schema:familyName "Seberry" ;
    schema:givenName "Jennifer" ;
    schema:name "Jennifer Seberry" ;

<> # Josef Pieprzyk
    a schema:Person ;
    schema:familyName "Pieprzyk" ;
    schema:givenName "Josef" ;
    schema:name "Josef Pieprzyk" ;

<> # Eiji Okamoto
    a schema:Person ;
    schema:familyName "Okamoto" ;
    schema:givenName "Eiji" ;
    schema:name "Eiji Okamoto" ;

    a schema:ProductModel ;
    schema:isbn "3540414169" ;
    schema:isbn "9783540414162" ;

    a schema:ProductModel ;
    schema:isbn "3662188317" ;
    schema:isbn "9783662188316" ;

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.