My Account Log in

1 option

Communications and Multimedia Security : 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings / edited by Herbert Leitold, Evangelos Markatos.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Leitold, Herbert, 1965- editor.
Markatos, Evangelos, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 4237.
Security and Cryptology ; 4237
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer networks.
Algorithms.
Management information systems.
Computer science.
Application software.
Electrical engineering.
Cryptology.
Computer Communication Networks.
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Information Systems Applications (incl. Internet).
Communications Engineering, Networks.
Local Subjects:
Cryptology.
Computer Communication Networks.
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Information Systems Applications (incl. Internet).
Communications Engineering, Networks.
Physical Description:
1 online resource (XII, 260 pages).
Edition:
First edition 2006.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
System Details:
text file PDF
Summary:
Duringthelastfewyearsweseenetworkandinformationsystemsecurityplaying an increasingly important role in our everyday lives. As our computers continue to get infested by all sorts of malware, and as our networks continue to choke with spam and malicious tra?c, we see more and more people losing their co- dence in information technologies as they get signi?cantly concernedabout their security as well as their privacy and that of their loved ones. In their e?ort to cope with the problem, scientists, managers, and politicians all over the world havedesignedandarecurrently implementing systematicapproachesto network and information security, most of which are underlined by the same principle: there is much more room for improvement and research. Along the lines of encouraging and catalyzing research in the area of c- munications and multimedia security, it is our great pleasure to present the proceedings of the 10th IFIP TC-6 TC-11 Conference on Communications and MultimediaSecurity(CMS2006),whichwasheldinHeraklion,CreteonOctober 19-21, 2006. Continuing the tradition of previous CMS conferences, we sought a balanced program containing presentations on various aspects of secure c- munication and multimedia systems. Special emphasis was laid on papers with direct practical relevance for the construction of secure communication systems. The selection of the program was a challenging task. In total, we received 76 submissions, from which 22 were selected for presentation as full papers.
Contents:
Computing of Trust in Ad-Hoc Networks
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
On the Privacy Risks of Publishing Anonymized IP Network Traces
Secure Mobile Notifications of Civilians in Case of a Disaster
A Fair Anonymous Submission and Review System
Attribute Delegation Based on Ontologies and Context Information
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart
Perturbing and Protecting a Traceable Block Cipher
A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors
Timed Release Cryptography from Bilinear Pairings Using Hash Chains
Compression of Encrypted Visual Data
Selective Encryption for Hierarchical MPEG
Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods
A Flexible and Open DRM Framework
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies
A Privacy Agent in Context-Aware Ubiquitous Computing Environments
Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems
Attack Graph Based Evaluation of Network Security
Information Modeling for Automated Risk Analysis
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.
Other Format:
Printed edition:
ISBN:
978-3-540-47823-2
9783540478232
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account