Communications and Multimedia Security 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 – June 2, 2010. Proceedings /

Over the last decade, we have witnessed a growing dependency on information technologyresultingina wide rangeofnew opportunities. Clearly,ithas become almost impossible to imagine life without a personal computer or laptop, or without a cell phone. Social network sites (SNS) are competing with face-...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Decker, Bart De (Επιμελητής έκδοσης), Schaumüller-Bichl, Ingrid (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 6109
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Keynotes
  • Keynotes
  • WiFi and RF Security
  • A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks
  • Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion
  • XML and Web Services Security
  • Throwing a MonkeyWrench into Web Attackers Plans
  • Security in OpenSocial-Instrumented Social Networking Services
  • Security for XML Data Binding
  • Watermarking and Multimedia Security
  • Watermark Detection for Video Bookmarking Using Mobile Phone Camera
  • Watermark-Based Authentication and Key Exchange in Teleconferencing Systems
  • Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking
  • Analysis and Detection of Malicious Code and Risk Management
  • Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
  • A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)
  • Business and IT Continuity Benchmarking
  • VoIP Security
  • Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks
  • SIP Proxies: New Reflectors in the Internet
  • Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal
  • Biometrics
  • Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication
  • Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction
  • Privacy Preserving Key Generation for Iris Biometrics
  • Applied Cryptography
  • Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare
  • Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
  • Detecting Hidden Encrypted Volumes
  • Secure Communications
  • Tor HTTP Usage and Information Leakage
  • Secure Communication Using Identity Based Encryption
  • Anonymous Client Authentication for Transport Layer Security.