My Account Log in

1 option

Communications and Multimedia Security : 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010, Proceedings / edited by Bart De Decker, Ingrid Schaumüller-Bichl.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Decker, Bart de, 1958- editor.
Schaumüller-Bichl, Ingrid, 1957- editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 6109.
Security and Cryptology ; 6109
Language:
English
Subjects (All):
Computer networks.
Operating systems (Computers).
Data encryption (Computer science).
Computer Communication Networks.
Operating Systems.
Cryptology.
Local Subjects:
Computer Communication Networks.
Operating Systems.
Cryptology.
Physical Description:
1 online resource (XIII, 281 pages) : 74 illustrations.
Edition:
First edition 2010.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
System Details:
text file PDF
Summary:
Over the last decade, we have witnessed a growing dependency on information technologyresultingina wide rangeofnew opportunities. Clearly,ithas become almost impossible to imagine life without a personal computer or laptop, or without a cell phone. Social network sites (SNS) are competing with face-- face encounters and may even oust them. Most SNS-adepts have hundreds of "friends", happily sharing pictures and pro?les and endless chitchat. We are on the threshold of the Internet of Things, where every object will have its RFID-tag. This will not only e?ect companies, who will be able to optimize their production and delivery processes, but also end users, who will be able to enjoy many new applications, ranging from smart shopping, and smart fridges to geo-localized services. In the near future, elderly people will be able to stay longer at home due to clever health monitoring systems. The sky seems to be the limit! However, we have also seen the other side of the coin: viruses, Trojan horses, breaches of privacy, identity theft, and other security threats. Our real and virtual worlds are becoming increasingly vulnerable to attack. In order to encouragesecurity researchby both academia and industry and to stimulate the dissemination of results, conferences need to be organized. With the 11th edition of the joint IFIP TC-6 TC-11 Conference on C- munications and Multimedia Security (CMS 2010), the organizers resumed the tradition of previous CMS conferences after a three-year recess.
Contents:
Keynotes
Keynotes
WiFi and RF Security
A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks
Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion
XML and Web Services Security
Throwing a MonkeyWrench into Web Attackers Plans
Security in OpenSocial-Instrumented Social Networking Services
Security for XML Data Binding
Watermarking and Multimedia Security
Watermark Detection for Video Bookmarking Using Mobile Phone Camera
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems
Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking
Analysis and Detection of Malicious Code and Risk Management
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)
Business and IT Continuity Benchmarking
VoIP Security
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks
SIP Proxies: New Reflectors in the Internet
Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal
Biometrics
Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication
Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction
Privacy Preserving Key Generation for Iris Biometrics
Applied Cryptography
Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare
Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
Detecting Hidden Encrypted Volumes
Secure Communications
Tor HTTP Usage and Information Leakage
Secure Communication Using Identity Based Encryption
Anonymous Client Authentication for Transport Layer Security.
Other Format:
Printed edition:
ISBN:
978-3-642-13241-4
9783642132414
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account