Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdom /
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Boston, MA :
Springer US,
2005.
|
Σειρά: | IFIP — The International Federation for Information Processing,
175 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Privacy/Anonymity
- Duo-Onions and Hydra-Onions — Failure and Adversary Resistant Onion Protocols
- Personal Attributes and Privacy
- Mobile Security 1
- Local Management of Credits and Debits in Mobile Ad Hoc Networks
- How Secure are Current Mobile Operating Systems?
- An Overview of Security Issues and Techniques in Mobile Agents
- Mobile Security 2
- A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography
- Mobile Trust Negotiation
- Weak Context Establishment Procedure for Mobility and Multi-Homing Management
- Security in Microsoft .Net
- A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components
- Threat Modelling for Web Services Based Web Applications
- Threat Modelling for ASP.NET
- Threat Modelling for SQL Servers
- Threat Modelling for Active Directory
- Threat Modelling for Security Tokens in Web Applications
- Cryptography
- Analysis of the DVB Common Scrambling Algorithm
- An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder
- Multimedia Security
- Robust Visual Hashing Using JPEG 2000
- A System for End-to-End Authentication of Adaptive Multimedia Content
- Application Level Security
- Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure
- Secure Role Based Messaging
- Five Non-Technical Pillars of Network Information Security Management.