close
1.

図書

図書
Eiji Okamoto, George Davida, Masahiro Mambo, (eds.)
出版情報: Berlin ; New York : Springer, c1998  xii, 356 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1396
所蔵情報: loading…
2.

図書

図書
岡本栄司, 満保雅浩著
出版情報: 東京 : 岩波書店, 1997.8  v, 111p ; 19cm
シリーズ名: 岩波科学ライブラリー ; 53
所蔵情報: loading…
3.

図書

図書
Masahiro Mambo, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c1999  ix, 275 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1729
所蔵情報: loading…
目次情報: 続きを見る
Electronic Money
Spending Programs: A Tool for Flexible Micropayments / Josep Domingo-Ferrer ; Jordi Herrera-Joancomarti
Money Conservation via Atomicity in Fair Off-Line E-Cash / Shouhuai Xu ; Moti Yung ; Gendu Zhang ; Hong Zhu
Engineering an eCash System / Tim Ebringer ; Peter Thorne
Electronic Payment and Unlinkability
Unlinkable Electronic Coupon Protocol with Anonymity Control / Toru Nakanishi ; Nobuaki Haruna ; Yuji Sugiyama
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives / Marc Joye ; Narn-Yih Lee ; Tzonelih Hwang
Secure Software Components, Mobile Agents, and Authentication
Security Properties of Software Components / Khaled Khan ; Jun Han ; Yuliang Zheng
Methods for Protecting a Mobile Agent's Route / Dirk Westhoff ; Markus Schneider ; Claus Unger ; Firoz Kaderali
Non-interactive Cryptosystem for Entity Authentication / Hyung-Woo Lee ; Jung-Eun Kim ; Tai-Yun Kim
Network Security
Implementation of Virtual Private Networks at the Transport Layer / Jorge Davila ; Javier Lopez ; Rene Peralta
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree / Hiroaki Kikuchi ; Kensuke Abe ; Shohachiro Nakanishi
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks / Yuji Watanabe ; Hideki Imai
Digital Watermarking
Highly Robust Image Watermarking Using Complementary Modulations / Chun-Shien Lu ; Hong-Yuan Mark Liao ; Shih-Kun Huang ; Chwen-Jye Sze
Region-Based Watermarking for Images / Gareth Brisbane ; Rei Safavi-Naini ; Philip Ogunbona
Digital Watermarking Robust Against JPEG Compression / Hye-Joo Lee ; Ji-Hwan Park
Protection of Software and Data
Fingerprints for Copyright Software Protection / Josef Pieprzyk
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption / Sang Uk Shin ; Kyeong Seop Sim ; Kyung Hyune Rhee
Electronic Money, Key Recovery, and Electronic Voting
On Anonymous Electronic Cash and Crime / Tomas Sander ; Amnon Ta-Shma
On the Difficulty of Key Recovery Systems / Seungjoo Kim ; Insoo Lee ; Masahiro Mambo ; Sungjun Park
An Improvement on a Practical Secret Voting Scheme / Miyako Ohkubo ; Fumiaki Miura ; Masayuki Abe ; Atsushi Fujioka ; Tatsuaki Okamoto
Digital Signatures
Undeniable Confirmer Signature / Khanh Nguyen ; Yi Mu ; Vijay Varadharajan
Extended Proxy Signatures for Smart Cards / Takeshi Okamoto ; Mitsuru Tada ; Eiji Okamoto
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures / Tsuyoshi Nishioka ; Goichiro Hanaoka
Cryptanalysis of Two Group Signature Schemes
Author Index
Electronic Money
Spending Programs: A Tool for Flexible Micropayments / Josep Domingo-Ferrer ; Jordi Herrera-Joancomarti
Money Conservation via Atomicity in Fair Off-Line E-Cash / Shouhuai Xu ; Moti Yung ; Gendu Zhang ; Hong Zhu
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼