Information Security
Springer Berlin (Verlag)
978-3-540-41416-2 (ISBN)
Multimedia Copyright Protection.- A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients.- Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models.- A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection.- Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling.- Region-Based Watermarking by Distribution Adjustment.- Hiding Information in Color Images Using Small Color Palettes.- An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software.- Characteristics of Some Binary Codes for Fingerprinting.- E-Commerce.- An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees.- Unlinkable Divisible Electronic Cash.- Weighted One-Way Hash Chain and Its Applications.- Linkability in Practical Electronic Cash Design.- Towards a Practical Secure Framework for Mobile Code Commerce.- Key Management.- Probabilistic Methods in Multicast Key Management.- Classification of Authentication Protocols: A Practical Approach.- Exploring Fair Exchange Protocols Using Specification Animation.- A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation.- Network Security and Access Control.- An Efficient Protocol for Certified Electronic Mail.- Performance Analysis of Secure Web Server Based on SSL.- Sherlock: Commercial High Assurance Network Computing Extended Abstract.- The Role of the Development Process in Operating System Security.- Cryptographic Systems.- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization.- A Signcryption Scheme Based on Integer Factorization.
Erscheint lt. Verlag | 6.12.2000 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | X, 322 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 233 mm |
Gewicht | 481 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • authentication • Data Security • Digital Payment Systems • digital signature schemes • Information Security • Network Security • operating system • privacy • secure communication • security • SIGNATUR • Systems Security |
ISBN-10 | 3-540-41416-9 / 3540414169 |
ISBN-13 | 978-3-540-41416-2 / 9783540414162 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich