Communications and Multimedia Security. Advanced Techniques for Network and Data Protection 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Lioy, Antonio (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Mazzocchi, Daniele (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003.
Έκδοση:1st ed. 2003.
Σειρά:Lecture Notes in Computer Science, 2828
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Cryptography
  • Computation of Cryptographic Keys from Face Biometrics
  • AUTHMAC_DH: A New Protocol for Authentication and Key Distribution
  • Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection
  • Network Security
  • Securing the Border Gateway Protocol: A Status Update
  • Towards an IPv6-Based Security Framework for Distributed Storage Resources
  • Operational Characteristics of an Automated Intrusion Response System
  • Mobile and Wireless Network Security
  • A Secure Multimedia System in Emerging Wireless Home Networks
  • Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents
  • A Security Scheme for Mobile Agent Platforms in Large-Scale Systems
  • Trust and Privacy
  • Privacy and Trust in Distributed Networks
  • Extending the SDSI / SPKI Model through Federation Webs
  • Trust- : An XML Framework for Trust Negotiations
  • Application Security
  • How to Specify Security Services: A Practical Approach
  • Application Level Smart Card Support through Networked Mobile Devices
  • Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage
  • Multimedia Security
  • Selective Encryption of the JPEG2000 Bitstream
  • Robust Spatial Data Hiding for Color Images
  • Watermark Security via Secret Wavelet Packet Subband Structures
  • A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression
  • Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs
  • Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization.