Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 – 21, 2005. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2005.
|
Σειρά: | Lecture Notes in Computer Science,
3677 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Applied Cryptography
- Fast Contract Signing with Batch Oblivious Transfer
- An Instruction Set Extension for Fast and Memory-Efficient AES Implementation
- Self-healing Key Distribution Schemes with Sponsorization
- DRM & E-Commerce
- Effective Protection Against Phishing and Web Spoofing
- Identity Based DRM: Personal Entertainment Domain
- Rights and Trust in Multimedia Information Management
- Signature Amortization Using Multiple Connected Chains
- Media Encryption
- A Key Embedded Video Codec for Secure Video Multicast
- Puzzle – A Novel Video Encryption Algorithm
- Selective Image Encryption Using JBIG
- Multimedia Security
- On Reversibility of Random Binning Techniques: Multimedia Perspectives
- A Graph–Theoretic Approach to Steganography
- Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme
- Privacy
- Video Surveillance: A Distributed Approach to Protect Privacy
- Privacy-Preserving Electronic Health Records
- Using XACML for Privacy Control in SAML-Based Identity Federations
- Biometrics & Access Control
- Verifier-Tuple as a Classifier for Biometric Handwriting Authentication – Combination of Syntax and Semantics
- Decentralised Access Control in 802.11 Networks
- Multimodal Biometrics for Voice and Handwriting
- Network Security
- Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks
- Polymorphic Code Detection with GA Optimized Markov Models
- A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks
- Mobile Security
- Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets
- Assessment of Palm OS Susceptibility to Malicious Code Threats
- Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication
- Work in Progress Track
- Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting
- INVUS: INtelligent VUlnerability Scanner
- Personal Rights Management– Enabling Privacy Rights in Digital Online Content
- Flexible Traitor Tracing for Anonymous Attacks
- Efficient Key Distribution for Closed Meetings in the Internet
- Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics
- Applying LR Cube Analysis to JSteg Detection
- Digital Signatures Based on Invertible Watermarks for Video Authentication
- A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents
- Semantically Extended Digital Watermarking Model for Multimedia Content
- An Architecture for Secure Policy Enforcement in E-Government Services Deployment
- Some Critical Aspects of the PKIX TSP
- Motivations for a Theoretical Approach to WYSIWYS
- Special Session: XML Security
- Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications
- Integrating XML Linked Time-Stamps in OASIS Digital Signature Services
- Trustworthy Verification and Visualisation of Multiple XML-Signatures
- Experience XML Security
- How to Make a Federation Manageable
- XML Signatures in an Enterprise Service Bus Environment
- Using the XML Key Management Specification (and Breaking X.509 Rules as You Go).