Sign in
ISW
1997
1998
1999
2000
1997
2000
Keyphrases
Publications
2000
Tapio Seppänen
,
Kaisu Mäkelä
,
Anja Keskinarkaus
Hiding Information in Color Images Using Small Color Palettes.
ISW
(2000)
Sung-Ming Yen
,
Yuliang Zheng
Weighted One-Way Hash Chain and Its Applications.
ISW
(2000)
Colin Boyd
,
Peter Kearney
Exploring Fair Exchange Protocols Using Specification Animation.
ISW
(2000)
Francesc Sebé
,
Josep Domingo-Ferrer
,
Jordi Herrera-Joancomartí
Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling.
ISW
(2000)
Oliver Benedens
Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models.
ISW
(2000)
Xiaodong Lin
,
Johnny W. Wong
,
Weidong Kou
Performance Analysis of Secure Web Server Based on SSL.
ISW
(2000)
Gaël Hachez
,
Laurent Den Hollander
,
Mehrdad Jalali
,
Jean-Jacques Quisquater
,
Christophe Vasserot
Towards a Practical Secure Framework for Mobile Code Commerce.
ISW
(2000)
Hideaki Goto
,
Masahiro Mambo
,
Kenjiro Matsumura
,
Hiroki Shizuya
An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software.
ISW
(2000)
Kazumasa Omote
,
Atsuko Miyaji
An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees.
ISW
(2000)
René Rosenbaum
,
Heidrun Schumann
A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection.
ISW
(2000)
Ron Steinfeld
,
Yuliang Zheng
A Signcryption Scheme Based on Integer Factorization.
ISW
(2000)
Stephen P. Morgan
,
Stephen W. Neal
,
Melissa A. Hartman
,
Matthew R. Laue
Sherlock: Commercial High Assurance Network Computing.
ISW
(2000)
Reihaneh Safavi-Naini
,
Willy Susilo
Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization.
ISW
(2000)
Gareth Brisbane
,
Reihaneh Safavi-Naini
,
Philip Ogunbona
Region-Based Watermarking by Distribution Adjustment.
ISW
(2000)
Ali Aydin Selçuk
,
Deepinder P. Sidhu
Probabilistic Methods in Multicast Key Management.
ISW
(2000)
Minoru Kuribayashi
,
Hatsukazu Tanaka
A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients.
ISW
(2000)
DongGook Park
,
Colin Boyd
,
Ed Dawson
Classification of Authentication Protocols: A Practical Approach.
ISW
(2000)
Josep Lluís Ferrer-Gomila
,
Magdalena Payeras-Capellà
,
Llorenç Huguet i Rotger
An Efficient Protocol for Certified Electronic Mail.
ISW
(2000)
Daisuke Nojiri
,
Goichiro Hanaoka
,
Hideki Imai
A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation.
ISW
(2000)
Greg Maitland
,
Jason Reid
,
Ernest Foo
,
Colin Boyd
,
Ed Dawson
Linkability in Practical Electronic Cash Design.
ISW
(2000)
Christian Payne
The Role of the Development Process in Operating System Security.
ISW
(2000)
Tina Lindkvist
Characteristics of Some Binary Codes for Fingerprinting.
ISW
(2000)
Toru Nakanishi
,
Yuji Sugiyama
Unlinkable Divisible Electronic Cash.
ISW
(2000)
volume 1975, 2000
Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings
ISW
1975 (2000)
1999
Hyung-Woo Lee
,
Jung-Eun Kim
,
Tai-Yun Kim
Non-interactive Cryptosystem for Entity Authentication.
ISW
(1999)
Tomas Sander
,
Amnon Ta-Shma
On Anonymous Electronic Cash and Crime.
ISW
(1999)
Chun-Shien Lu
,
Hong-Yuan Mark Liao
,
Shih-Kun Huang
,
Chwen-Jye Sze
Highly Robust Image Watermarking Using Complementary Modulations.
ISW
(1999)
Marc Joye
,
Narn-Yih Lee
,
Tzonelih Hwang
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives.
ISW
(1999)
Seungjoo Kim
,
Insoo Lee
,
Masahiro Mambo
,
Sungjun Park
On the Difficulty of Key Recovery Systems.
ISW
(1999)
Toru Nakanishi
,
Nobuaki Haruna
,
Yuji Sugiyama
Unlinkable Electronic Coupon Protocol with Anonymity Control.
ISW
(1999)
Tim Ebringer
,
Peter Thorne
Engineering an eCash System.
ISW
(1999)
Shouhuai Xu
,
Moti Yung
,
Gendu Zhang
,
Hong Zhu
Money Conservation via Atomicity in Fair Off-Line E-Cash.
ISW
(1999)
Takeshi Okamoto
,
Mitsuru Tada
,
Eiji Okamoto
Extended Proxy Signatures for Smart Cards.
ISW
(1999)
Miyako Ohkubo
,
Fumiaki Miura
,
Masayuki Abe
,
Atsushi Fujioka
,
Tatsuaki Okamoto
An Improvement on a Practical Secret Voting Scheme.
ISW
(1999)
Josep Domingo-Ferrer
,
Jordi Herrera-Joancomartí
Spending Programs: A Tool for Flexible Micropayments.
ISW
(1999)
Tsuyoshi Nishioka
,
Goichiro Hanaoka
,
Hideki Imai
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.
ISW
(1999)
Sang-Uk Shin
,
Kyeong Seop Sim
,
Kyung Hyune Rhee
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption.
ISW
(1999)
Hye-Joo Lee
,
Ji-Hwan Park
,
Yuliang Zheng
Digital Watermarking Robust Against JPEG Compression.
ISW
(1999)
Gareth Brisbane
,
Reihaneh Safavi-Naini
,
Philip Ogunbona
Region-Based Watermarking for Images.
ISW
(1999)
Josef Pieprzyk
Fingerprints for Copyright Software Protection.
ISW
(1999)
Khaled M. Khan
,
Jun Han
,
Yuliang Zheng
Security Properties of Software Components.
ISW
(1999)
Khanh Quoc Nguyen
,
Yi Mu
,
Vijay Varadharajan
Undeniable Confirmer Signature.
ISW
(1999)
Marc Joye
,
Seungjoo Kim
,
Narn-Yih Lee
Cryptanalysis of Two Group Signature Schemes.
ISW
(1999)
Dirk Westhoff
,
Markus Schneider
,
Claus Unger
,
Firoz Kaderali
Methods for Protecting a Mobile Agent's Route.
ISW
(1999)
Jorge Dávila
,
Javier López
,
René Peralta
Implementation of Virtual Private Networks at the Transport Layer.
ISW
(1999)
Hiroaki Kikuchi
,
Kensuke Abe
,
Shohachiro Nakanishi
-Valued Hash Tree.
ISW
(1999)
Yuji Watanabe
,
Hideki Imai
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks.
ISW
(1999)
volume 1729, 1999
Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings
ISW
1729 (1999)
volume 1396, 1998
Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings
ISW
1396 (1998)
1997
Yoshiki Sameshima
A Key Escrow System of the RSA Cryptosystem.
ISW
(1997)