rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540478201

Communications and Multimedia Security

by ;
  • ISBN13:

    9783540478201

  • ISBN10:

    3540478205

  • Format: Paperback
  • Copyright: 2006-11-20
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $89.99 Save up to $70.19
  • Digital
    $42.90
    Add to Cart

    DURATION
    PRICE

Summary

This book constitutes the refereed proceedings of the 10th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, CMS 2006, held in Heraklion, Crete, Greece in October 2006. The 22 revised full papers presented were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on applied network and information security, identification and authentication, DRM and multimedia security, Web and XML security, cryptography, privacy and data protection, as well as network and information security analysis and modeling.

Table of Contents

Advances in Network and Information Security
Computing of Trust in Ad-Hoc Networksp. 1
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscationp. 12
On the Privacy Risks of Publishing Anonymized IP Network Tracesp. 22
Secure Mobile Notifications of Civilians in Case of a Disasterp. 33
A Fair Anonymous Submission and Review Systemp. 43
Attribute Delegation Based on Ontologies and Context Informationp. 54
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domainsp. 67
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchangep. 87
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apartp. 97
Perturbing and Protecting a Traceable Block Cipherp. 109
A New Encryption and Hashing Scheme for the Security Architecture for Microprocessorsp. 120
Timed Release Cryptography from Bilinear Pairings Using Hash Chainsp. 130
Compression of Encrypted Visual Datap. 141
Selective Encryption for Hierarchical MPEGp. 151
Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methodsp. 161
A Flexible and Open DRM Frameworkp. 173
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologiesp. 185
A Privacy Agent in Context-Aware Ubiquitous Computing Environmentsp. 196
Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systemsp. 206
Attack Graph Based Evaluation of Network Securityp. 216
Information Modeling for Automated Risk Analysisp. 228
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communicationp. 240
Author Indexp. 253
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program