Communications and Multimedia Security. Advanced Techniques for Network and Data Protection 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2003.
|
Έκδοση: | 1st ed. 2003. |
Σειρά: | Lecture Notes in Computer Science,
2828 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Cryptography
- Computation of Cryptographic Keys from Face Biometrics
- AUTHMAC_DH: A New Protocol for Authentication and Key Distribution
- Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection
- Network Security
- Securing the Border Gateway Protocol: A Status Update
- Towards an IPv6-Based Security Framework for Distributed Storage Resources
- Operational Characteristics of an Automated Intrusion Response System
- Mobile and Wireless Network Security
- A Secure Multimedia System in Emerging Wireless Home Networks
- Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents
- A Security Scheme for Mobile Agent Platforms in Large-Scale Systems
- Trust and Privacy
- Privacy and Trust in Distributed Networks
- Extending the SDSI / SPKI Model through Federation Webs
- Trust- : An XML Framework for Trust Negotiations
- Application Security
- How to Specify Security Services: A Practical Approach
- Application Level Smart Card Support through Networked Mobile Devices
- Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage
- Multimedia Security
- Selective Encryption of the JPEG2000 Bitstream
- Robust Spatial Data Hiding for Color Images
- Watermark Security via Secret Wavelet Packet Subband Structures
- A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression
- Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs
- Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization.