did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540287919

Communications and Multimedia Security : 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings

by ; ; ;
  • ISBN13:

    9783540287919

  • ISBN10:

    3540287914

  • Format: Paperback
  • Copyright: 2005-11-15
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $109.00

Summary

This book constitutes the refereed proceedings of the 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, CMS 2005, held in Salzburg, Austria in September 2005. The 28 revised full papers and 13 two-page abstracts presented together with 4 invited papers were carefully reviewed and selected from 143 submissions. The papers are organized in topical sections on applied cryptography, DRM and e-commerce, media encryption, multimedia security, privacy, biometrics and access control, network security, mobile security, and XML security.

Table of Contents

Applied Cryptography
Fast Contract Signing with Batch Oblivious Transfer
1(10)
L'ubica Stanekova
Martin Stanek
An Instruction Set Extension for Fast and Memory-Efficient AES Implementation
11(11)
Stefan Tillich
Johann Großschadl
Alexander Szekely
Self-Healing Key Distribution Schemes with Sponsorization
22(10)
German Saez
DRM & E-Commerce
Effective Protection Against Phishing and Web Spoofing
32(10)
Rolf Oppliger
Sebastian Gajek
Identity Based DRM: Personal Entertainment Domain
42(13)
Paul Koster
Frank Kamperman
Peter Lenoir
Koen Vrielink
Rights and Trust in Multimedia Information Management
55(10)
Jaime Delgado
Victor Torres
Silvia Llorente
Eva Rodriguez
Signature Amortization Using Multiple Connected Chains
65(12)
Qusai Abuein
Susumu Shibusawa
Media Encryption
A Key Embedded Video Codec for Secure Video Multicast
77(11)
Hao Yin
Chuang Lin
Feng Qiu
Xiaowen Chu
Geyong Min
Puzzle -- A Novel Video Encryption Algorithm
88(10)
Fuwen Liu
Hartmut Koenig
Selective Image Encryption Using JBIG
98(10)
Roman Pfarrhofer
Andreas Uhl
Multimedia Security
On Reversibility of Random Binning Techniques: Multimedia Perspectives
108(11)
Sviatoslav Voloshynovskiy
Oleksiy Koval
Emre Topak
Jose Emilio Vila-Forcen
Pedro Comesana Alfaro
Thierry Pun
A Graph-Theoretic Approach to Steganography
119(10)
Stefan Hetzl
Petra Mutzel
Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme
129(11)
Andre Adelsbach
Markus Rohe
Ahmad-Reza Sadeghi
Privacy
Video Surveillance: A Distributed Approach to Protect Privacy
140(10)
Martin Schaffer
Peter Schartner
Privacy-Preserving Electronic Health Records
150(10)
Liesje Demuynck
Bart De Decker
Using XACML for Privacy Control in SAML-Based Identity Federations
160(10)
Wolfgang Hommel
Biometrics & Access Control
Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics
170(10)
Andrea Oermann
Jana Dittmann
Claus Vielhauer
Decentralised Access Control in 802.11 Networks
180(11)
Marco Domenico Aime
Antonio Lioy
Gianluca Ramunno
Multimodal Biometrics for Voice and Handwriting
191(9)
Claus Vielhauer
Tobias Scheidat
Network Security
Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks
200(10)
Huafei Zhu
Feng Bao
Tieyan Li
Polymorphic Code Detection with GA Optimized Markov Models
210(10)
Udo Payer
Stefan Kraxberger
A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks
220(10)
Minsoo Lee
Sehyun Park
Mobile Security
Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets
230(10)
Wiebke Dresp
Assessment of Palm OS Susceptibility to Malicious Code Threats
240(10)
Tom Goovaerts
Bart De Win
Bart De Decker
Wouter Joosen
Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication
250(11)
HyunGon Kim
ByeongKyun Oh
Work in Progress Track
Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting
261(3)
Sascha Schimke
Athanasios Valsamakis
Claus Vielhauer
Yannis Stylianou
INVUS: Intelligent Vulnerability Scanner
264(2)
Turker Akyuz
Ibrahim Sogukpinar
Personal Rights Management -- Enabling Privacy Rights in Digital Online Content
266(3)
Mina Deng
Lothar Fritsch
Klaus Kursawe
Flexible Traitor Tracing for Anonymous Attacks
269(2)
Hongxia Jin
Jeffery Lotspiech
Efficient Key Distribution for Closed Meetings in the Internet
271(2)
Fuwen Liu
Hartmut Koenig
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics
273(2)
Taras Holotyak
Jessica Fridrich
Sviatoslav Voloshynovsky
Applying LR Cube Analysis to JSteg Detection
275(2)
Kwangsoo Lee
Changho Jung
Sangjin Lee
HyungJun Kim
Jongin Lim
Digital Signatures Based on Invertible Watermarks for Video Authentication
277(3)
Enrico Hauer
Jana Dittmann
Martin Steinebach
A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents
280(2)
Renato Villan
Sviatoslav Voloshynovskiy
Frederic Deguillaume
Yuriy Rytsar
Oleksiy Koval
Emre Topak
Ernesto Rivera
Thierry Pun
Semantically Extended Digital Watermarking Model for Multimedia Content
282(2)
Huajian Liu
Lucilla Croce Ferri
Martin Steinebach
An Architecture for Secure Policy Enforcement in E-Government Services Deployment
284(2)
Nikolaos Oikonomidis
Sergiu Tcaciuc
Christoph Ruland
Some Critical Aspects of the PKIX TSP
286(3)
Cristian Marinescu
Nicolae Tapus
Motivations for a Theoretical Approach to WYSIWYS
289(2)
Antonio Lioy
Gianluca Ramunno
Marco Domenico Aime
Massimiliano Pala
Special Session: XML Security
Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications
291(10)
Lars Ewers
Wolfgang Kubbilun
Lijun Liao
Jorg Schwenk
Integrating XML Linked Time-Stamps in OASIS Digital Signature Services
301(10)
Ana Isabel Gonzalez-Tablas
Karel Wouters
Trustworthy Verification and Visualisation of Multiple XML-Signatures
311(10)
Wolfgang Kubbilun
Sebastian Gajek
Michael Psarros
Jorg Schwenk
Experience XML Security -- The XML-Security Plug-In for Eclipse
321(9)
Dominik Schadow
How to Make a Federation Manageable
330(9)
Christian Geuer-Pollmann
XML Signatures in an Enterprise Service Bus Environment
339(9)
Eckehard Hermann
Dieter Kessler
Using the XML Key Management Specification (and Breaking X.509 Rules as You Go)
348(11)
Stephen Farrell
Jose Kahan
Author Index 359

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program