Communications and Multimedia Security [electronic resource] : 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings / edited by Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl.

1st ed. 2005.
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology SL 4, 3677
Security and Cryptology ; 3677
1 online resource (XIII, 360 pages)
Data encryption (Computer science)
Computer networks.
Multimedia systems.
Application software.
Management information systems.
Computer science.
Computers and civilization.
Local subjects:
Computer Communication Networks.
Multimedia Information Systems.
Information Systems Applications (incl. Internet).
Management of Computing and Information Systems.
Computers and Society.
System Details:
text file PDF
Applied Cryptography
Fast Contract Signing with Batch Oblivious Transfer
An Instruction Set Extension for Fast and Memory-Efficient AES Implementation
Self-healing Key Distribution Schemes with Sponsorization
DRM and E-Commerce
Effective Protection Against Phishing and Web Spoofing
Identity Based DRM: Personal Entertainment Domain
Rights and Trust in Multimedia Information Management
Signature Amortization Using Multiple Connected Chains
Media Encryption
A Key Embedded Video Codec for Secure Video Multicast
Puzzle - A Novel Video Encryption Algorithm
Selective Image Encryption Using JBIG
Multimedia Security
On Reversibility of Random Binning Techniques: Multimedia Perspectives
A Graph-Theoretic Approach to Steganography
Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme
Video Surveillance: A Distributed Approach to Protect Privacy
Privacy-Preserving Electronic Health Records
Using XACML for Privacy Control in SAML-Based Identity Federations
Biometrics and Access Control
Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics
Decentralised Access Control in 802.11 Networks
Multimodal Biometrics for Voice and Handwriting
Network Security
Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks
Polymorphic Code Detection with GA Optimized Markov Models
A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks
Mobile Security
Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets
Assessment of Palm OS Susceptibility to Malicious Code Threats
Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication
Work in Progress Track
Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting
INVUS: INtelligent VUlnerability Scanner
Personal Rights Management- Enabling Privacy Rights in Digital Online Content
Flexible Traitor Tracing for Anonymous Attacks
Efficient Key Distribution for Closed Meetings in the Internet
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics
Applying LR Cube Analysis to JSteg Detection
Digital Signatures Based on Invertible Watermarks for Video Authentication
A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents
Semantically Extended Digital Watermarking Model for Multimedia Content
An Architecture for Secure Policy Enforcement in E-Government Services Deployment
Some Critical Aspects of the PKIX TSP
Motivations for a Theoretical Approach to WYSIWYS
Special Session: XML Security
Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications
Integrating XML Linked Time-Stamps in OASIS Digital Signature Services
Trustworthy Verification and Visualisation of Multiple XML-Signatures
Experience XML Security
How to Make a Federation Manageable
XML Signatures in an Enterprise Service Bus Environment
Using the XML Key Management Specification (and Breaking X.509 Rules as You Go).
Dittmann, Jana, editor., Editor,
Katzenbeisser, Stefan, editor., Editor,
Uhl, Andreas. editor., Editor,
SpringerLink (Online service)
Contained In:
Springer eBooks
Other format:
Printed edition:
Printed edition:
Publisher Number:
10.1007/11552055 doi
Access Restriction:
Restricted for use by site license.
Location Notes Your Loan Policy
Description Status Barcode Your Loan Policy