Information Security: Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings
The 1999 International Information Security Workshop, ISW'99, was held on Monash University's Malaysia Campus, which is about 20km to the south west of downtown Kuala Lumpur, November 6-7, 1999. ISW'99soughtadi erentgoalfromitspredecessor, ISW'97, heldinIshikawa, Japan, whose proceedings were published as Volume 1396 of Springer Verlag's LNCS series. The focus of ISW'99 wason the following emerging areasof imp- tance in information security: multimedia watermarking, electronic cash, secure software components and mobile agents, and protection of software. Theprogramcommitteereceived38fullsubmissionsfrom12countriesand- gions: Australia, China, France, Germany, Hong Kong, Japan, Korea, Malaysia, Singapore, Spain, Taiwan, and USA, and selected 23 of them for presentation. Among the 23 presentations, 19 were regular talks and the remaining 4 were short talks. Each submission was reviewed by at least two expert referees. We are grateful to the members of the program committee for reviewing and selecting papers in a very short period of time. Their comments helped the authors improve the n al version of their papers. Our thanks also go to Patrick McDaniel, Masaji Kawahara, and Yasuhiro Ohtaki who assisted in reviewing papers. In addition, we would like to thank all the authors, including those whose submissions were not accepted, for their contribution to the success of this workshop. The workshop was organized with the help of local committee members, - cluding Cheang Kok Soon, Hiew Pang Leang, Lily Leong, and Robin Pollard.
What people are saying - Write a review
We haven't found any reviews in the usual places.
A Tool for Flexible Micropayments
Money Conservation via Atomicity in Fair OffLine ECash
Unlinkable Electronic Coupon Protocol with Anonymity Control
On the Security of the LeeChang Group Signature Scheme and Its Derivatives Extended Abstract?
Security Properties of Software Components
Methods for Protecting a Mobile Agents Route
Noninteractive Cryptosystem for Entity Authentication
Implementation of Virtual Private Networks at the Transport Layer
Digital Watermarking Robust Against JPEG Compression
Fingerprints for Copyright Software Protection
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption
On Anonymous Electronic Cash and Crime
On the Di culty of Key Recovery Systems
An Improvement on a Practical Secret Voting Scheme
Undeniable Con rmer Signature
Extended Proxy Signatures for Smart Cards
Performance Evaluation of Certicate Revocation Using kValued Hash Tree
How to Enhance the Security against Latent Virus Attacks?
Highly Robust Image Watermarking Using Complementary Modulations
RegionBased Watermarking for Images
Other editions - View all
Information Security: Second International Workshop, ISW'99, Kuala Lumpur ...
No preview available - 1999
active rebooting Advances in Cryptology agent agent’s route algorithm anonymity atomicity authentication bank blind signature buyer certificate checks ciphertext coefficients coins communication component Computer Science context Cryptography Cryptology cryptosystem decryption detection digital signature digital watermarking discrete logarithm e-cash e-coins electronic cash embedded encryption group signature group signature scheme hash function hash tree hash value IEEE implementation infection Internet key escrow key recovery Lecture Notes LNCS method micropayment mod q modulation MPEG non-interactive Notes in Computer oblivious transfer off-line original signer parameters payment pixels proactive maintenance problem Proc proof properties proposed scheme protection protocol proxy signature proxy signer public key random robustness Schnorr signature secret key secret-algorithm segments sends share smart card spending program Springer-Verlag sub-ticket talliers threshold ticket transaction transcript valid value instructions verifier viruses voters voting watermarked image wavelet zero knowledge proofs