Communications and Multimedia Security 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006. Proceedings /

Duringthelastfewyearsweseenetworkandinformationsystemsecurityplaying an increasingly important role in our everyday lives. As our computers continue to get infested by all sorts of malware, and as our networks continue to choke with spam and malicious tra?c, we see more and more people losing their...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Leitold, Herbert (Επιμελητής έκδοσης), Markatos, Evangelos P. (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Σειρά:Lecture Notes in Computer Science, 4237
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Computing of Trust in Ad-Hoc Networks
  • TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
  • On the Privacy Risks of Publishing Anonymized IP Network Traces
  • Secure Mobile Notifications of Civilians in Case of a Disaster
  • A Fair Anonymous Submission and Review System
  • Attribute Delegation Based on Ontologies and Context Information
  • Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains
  • One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange
  • Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart
  • Perturbing and Protecting a Traceable Block Cipher
  • A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors
  • Timed Release Cryptography from Bilinear Pairings Using Hash Chains
  • Compression of Encrypted Visual Data
  • Selective Encryption for Hierarchical MPEG
  • Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods
  • A Flexible and Open DRM Framework
  • PPINA – A Forensic Investigation Protocol for Privacy Enhancing Technologies
  • A Privacy Agent in Context-Aware Ubiquitous Computing Environments
  • Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems
  • Attack Graph Based Evaluation of Network Security
  • Information Modeling for Automated Risk Analysis
  • Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.