Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdom /

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Chadwick, David (Επιμελητής έκδοσης), Preneel, Bart (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US, 2005.
Σειρά:IFIP — The International Federation for Information Processing, 175
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Privacy/Anonymity
  • Duo-Onions and Hydra-Onions — Failure and Adversary Resistant Onion Protocols
  • Personal Attributes and Privacy
  • Mobile Security 1
  • Local Management of Credits and Debits in Mobile Ad Hoc Networks
  • How Secure are Current Mobile Operating Systems?
  • An Overview of Security Issues and Techniques in Mobile Agents
  • Mobile Security 2
  • A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography
  • Mobile Trust Negotiation
  • Weak Context Establishment Procedure for Mobility and Multi-Homing Management
  • Security in Microsoft .Net
  • A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components
  • Threat Modelling for Web Services Based Web Applications
  • Threat Modelling for ASP.NET
  • Threat Modelling for SQL Servers
  • Threat Modelling for Active Directory
  • Threat Modelling for Security Tokens in Web Applications
  • Cryptography
  • Analysis of the DVB Common Scrambling Algorithm
  • An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder
  • Multimedia Security
  • Robust Visual Hashing Using JPEG 2000
  • A System for End-to-End Authentication of Adaptive Multimedia Content
  • Application Level Security
  • Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure
  • Secure Role Based Messaging
  • Five Non-Technical Pillars of Network Information Security Management.