Information Security: Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings
Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry
Springer, Jan 12, 2001 - Computer security - 323 pages
This book constitutes the refereed proceedings of the Third International Workshop on Information Security, ISW 2000, held in Wollongong, Australia in December 2000. The 23 revised full papers presented were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on multimedia copyright protection, e-commerce, key management, network security and access control, and cryptographic systems.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Multimedia Copyright Protection
Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models
A Steganographic Framework for Reference Colour Based Encoding
18 other sections not shown
Other editions - View all
algorithm anonymity applied APriKey attack auction authentication protocols bid vector bidders bidding points binary tree bits cancelled chrominance codeword coin color palette communication Computer Science cryptographic decryption denote detection digital signature discrete logarithm distribution domain e-cash system efficient electronic cash embed embedding encryption entities evaluation example exchange protocols F value fingerprinting forgery h h h hash chain IEEE implementation Internet linear code LNCS MessagesSent method micropayment mobile code multicast node non-repudiation NURBS Okamoto one-way function one-way hash chain OpenBSD operation Oreceipts original parameters parse tree payment performance Pieprzyk pirates pixel private key problem proposed prototype public key random rekey robustness secret key server Sherlock signature scheme signcryption signcryption scheme signer smart card source code steganographic StirMark sub-protocol tamper-resistant tamper-resistant software technique transaction trusted watermark