Abstract
I am Sasaki from Hitachi Systems Development Laboratory. Today I speak about visual marks, secure and portable visual marks for the cyber world. This slide shows the conduct of this presentation. First of all I will show the requirement for cyberworld marks. Visual marks – for example graphic signals – are useful in the real world, it is possible to compare information briefly, and they are clear and familiar to a non-professional. Visual marks are also useful in the cyberworld, but insecure in cyberworld because easy to fool and tamper with, and easy to repeat the marks on unauthorised data. So useful and secure marks are desired for the cyberworld, with proposal – namely Internet-marks – in this presentation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sasaki, R. (2000). INTERNET-MARKs. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 1999. Lecture Notes in Computer Science, vol 1796. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10720107_27
Download citation
DOI: https://doi.org/10.1007/10720107_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67381-1
Online ISBN: 978-3-540-45570-7
eBook Packages: Springer Book Archive