default search action
7th Communications and Multimedia Security 2003: Torino, Italy
- Antonio Lioy, Daniele Mazzocchi:
Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings. Lecture Notes in Computer Science 2828, Springer 2003, ISBN 3-540-20185-8
Cryptography
- Alwyn Goh, David Ngo Chek Ling:
Computation of Cryptographic Keys from Face Biometrics. 1-13 - Heba Kamal Aslan:
AUTHMAC_DH: A New Protocol for Authentication and Key Distribution. 14-26 - Alwyn Goh, David Ngo Chek Ling:
Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection. 27-39
Network Security
- Stephen T. Kent:
Securing the Border Gateway Protocol: A Status Update. 40-53 - Alessandro Bassi, Julien Laganier:
Towards an IPv6-Based Security Framework for Distributed Storage Resources. 54-64 - Maria Papadaki, Steven Furnell, Benn Lines, Paul L. Reynolds:
Operational Characteristics of an Automated Intrusion Response System. 65-75
Mobile and Wireless Network Security
- Nut Taesombut, Richard Y. Huang, P. Venkat Rangan:
A Secure Multimedia System in Emerging Wireless Home Networks. 76-88 - Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji:
Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents. 89-103 - Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro:
A Security Scheme for Mobile Agent Platforms in Large-Scale Systems. 104-116
Trust and Privacy
- Thomas Rössler, Arno Hollosi:
Privacy and Trust in Distributed Networks. 117-131 - Altair Olivo Santin, Joni da Silva Fraga, Carlos Maziero:
Extending the SDSI / SPKI Model through Federation Webs. 132-145 - Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini:
Trust-Chi: An XML Framework for Trust Negotiations. 146-157
Application Security
- Javier López, Juan J. Ortega, José Luis Vivas, José M. Troya:
How to Specify Security Services: A Practical Approach. 158-171 - Pierpaolo Baglietto, Francesco Moggia, Nicola Zingirian, Massimo Maresca:
Application Level Smart Card Support through Networked Mobile Devices. 172-180 - Alwyn Goh, Wai Kuan Yip, David Ngo Chek Ling:
Flexibly Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage. 181-193
Multimedia Security
- Roland Norcen, Andreas Uhl:
Selective Encryption of the JPEG2000 Bitstream. 194-204 - Xiaoqiang Li, Xiangyang Xue, Wei Li:
Robust Spatial Data Hiding for Color Images. 205-213 - Werner Dietl, Andreas Uhl:
Watermark Security via Secret Wavelet Packet Subband Structures. 214-225 - David Megías, Jordi Herrera-Joancomartí, Julià Minguillón:
A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression. 226-238 - Alwyn Goh, Geong Sen Poh, David Ngo Chek Ling:
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs. 239-251 - Bubi G. Flepp-Stars, Herbert Stögner, Andreas Uhl:
Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization. 252-263
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.