Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 – 21, 2005. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Dittmann, Jana (Επιμελητής έκδοσης), Katzenbeisser, Stefan (Επιμελητής έκδοσης), Uhl, Andreas (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
Σειρά:Lecture Notes in Computer Science, 3677
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Applied Cryptography
  • Fast Contract Signing with Batch Oblivious Transfer
  • An Instruction Set Extension for Fast and Memory-Efficient AES Implementation
  • Self-healing Key Distribution Schemes with Sponsorization
  • DRM & E-Commerce
  • Effective Protection Against Phishing and Web Spoofing
  • Identity Based DRM: Personal Entertainment Domain
  • Rights and Trust in Multimedia Information Management
  • Signature Amortization Using Multiple Connected Chains
  • Media Encryption
  • A Key Embedded Video Codec for Secure Video Multicast
  • Puzzle – A Novel Video Encryption Algorithm
  • Selective Image Encryption Using JBIG
  • Multimedia Security
  • On Reversibility of Random Binning Techniques: Multimedia Perspectives
  • A Graph–Theoretic Approach to Steganography
  • Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme
  • Privacy
  • Video Surveillance: A Distributed Approach to Protect Privacy
  • Privacy-Preserving Electronic Health Records
  • Using XACML for Privacy Control in SAML-Based Identity Federations
  • Biometrics & Access Control
  • Verifier-Tuple as a Classifier for Biometric Handwriting Authentication – Combination of Syntax and Semantics
  • Decentralised Access Control in 802.11 Networks
  • Multimodal Biometrics for Voice and Handwriting
  • Network Security
  • Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks
  • Polymorphic Code Detection with GA Optimized Markov Models
  • A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks
  • Mobile Security
  • Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets
  • Assessment of Palm OS Susceptibility to Malicious Code Threats
  • Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication
  • Work in Progress Track
  • Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting
  • INVUS: INtelligent VUlnerability Scanner
  • Personal Rights Management– Enabling Privacy Rights in Digital Online Content
  • Flexible Traitor Tracing for Anonymous Attacks
  • Efficient Key Distribution for Closed Meetings in the Internet
  • Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics
  • Applying LR Cube Analysis to JSteg Detection
  • Digital Signatures Based on Invertible Watermarks for Video Authentication
  • A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents
  • Semantically Extended Digital Watermarking Model for Multimedia Content
  • An Architecture for Secure Policy Enforcement in E-Government Services Deployment
  • Some Critical Aspects of the PKIX TSP
  • Motivations for a Theoretical Approach to WYSIWYS
  • Special Session: XML Security
  • Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications
  • Integrating XML Linked Time-Stamps in OASIS Digital Signature Services
  • Trustworthy Verification and Visualisation of Multiple XML-Signatures
  • Experience XML Security
  • How to Make a Federation Manageable
  • XML Signatures in an Enterprise Service Bus Environment
  • Using the XML Key Management Specification (and Breaking X.509 Rules as You Go).