Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings

Front Cover
Springer Science & Business Media, Oct 20, 1999 - Business & Economics - 275 pages
The 1999 International Information Security Workshop, ISW'99, was held on Monash University's Malaysia Campus, which is about 20km to the south west of downtown Kuala Lumpur, November 6-7, 1999. ISW'99soughtadi erentgoalfromitspredecessor, ISW'97, heldinIshikawa, Japan, whose proceedings were published as Volume 1396 of Springer Verlag's LNCS series. The focus of ISW'99 wason the following emerging areasof imp- tance in information security: multimedia watermarking, electronic cash, secure software components and mobile agents, and protection of software. Theprogramcommitteereceived38fullsubmissionsfrom12countriesand- gions: Australia, China, France, Germany, Hong Kong, Japan, Korea, Malaysia, Singapore, Spain, Taiwan, and USA, and selected 23 of them for presentation. Among the 23 presentations, 19 were regular talks and the remaining 4 were short talks. Each submission was reviewed by at least two expert referees. We are grateful to the members of the program committee for reviewing and selecting papers in a very short period of time. Their comments helped the authors improve the n al version of their papers. Our thanks also go to Patrick McDaniel, Masaji Kawahara, and Yasuhiro Ohtaki who assisted in reviewing papers. In addition, we would like to thank all the authors, including those whose submissions were not accepted, for their contribution to the success of this workshop. The workshop was organized with the help of local committee members, - cluding Cheang Kok Soon, Hiew Pang Leang, Lily Leong, and Robin Pollard.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

A Tool for Flexible Micropayments
1
Money Conservation via Atomicity in Fair OffLine ECash
14
Unlinkable Electronic Coupon Protocol with Anonymity Control
37
On the Security of the LeeChang Group Signature Scheme and Its Derivatives Extended Abstract?
47
Security Properties of Software Components
52
Methods for Protecting a Mobile Agents Route
57
Noninteractive Cryptosystem for Entity Authentication
72
Implementation of Virtual Private Networks at the Transport Layer
85
Digital Watermarking Robust Against JPEG Compression
167
Fingerprints for Copyright Software Protection
178
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption
191
On Anonymous Electronic Cash and Crime
202
On the Di culty of Key Recovery Systems
207
An Improvement on a Practical Secret Voting Scheme
225
Undeniable Con rmer Signature
235
Extended Proxy Signatures for Smart Cards
247

Performance Evaluation of Certicate Revocation Using kValued Hash Tree
103
How to Enhance the Security against Latent Virus Attacks?
118
Highly Robust Image Watermarking Using Complementary Modulations
136
RegionBased Watermarking for Images
154
A New Digital Signature Scheme on IDBased KeySharing Infrastructures
259
Cryptanalysis of Two Group Signature Schemes
271
Author Index
276
Copyright

Other editions - View all

Common terms and phrases