Communications and Multimedia Security: 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings / Edition 1

Communications and Multimedia Security: 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings / Edition 1

by Herbert Leitold
     
 

ISBN-10: 3540478205

ISBN-13: 9783540478201

Pub. Date: 11/20/2006

Publisher: Springer Berlin Heidelberg

This book constitutes the refereed proceedings of the 10th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, CMS 2006, held in Heraklion, Crete, Greece in October 2006.

The 22 revised full papers presented were carefully reviewed and selected from 76 submissions.

Overview

This book constitutes the refereed proceedings of the 10th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, CMS 2006, held in Heraklion, Crete, Greece in October 2006.

The 22 revised full papers presented were carefully reviewed and selected from 76 submissions.

Product Details

ISBN-13:
9783540478201
Publisher:
Springer Berlin Heidelberg
Publication date:
11/20/2006
Series:
Lecture Notes in Computer Science / Security and Cryptology Series, #4237
Edition description:
2006
Pages:
260
Product dimensions:
0.57(w) x 6.14(h) x 9.21(d)

Table of Contents

Computing of Trust in Ad-Hoc Networks.- TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation.- On the Privacy Risks of Publishing Anonymized IP Network Traces.- Secure Mobile Notifications of Civilians in Case of a Disaster.- A Fair Anonymous Submission and Review System.- Attribute Delegation Based on Ontologies and Context Information.- Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains.- One-Round Prool for Two-Party Verifier-Based Password-Authenticated Key Exchange.- Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart.- Perturbing and Protecting a Traceable Block Cipher.- A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors.- Timed Release Cryptography from Bilinear Pairings Using Hash Chains.- Compression of Encrypted Visual Data.- Selective Encryption for Hierarchical MPEG.- Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods.- A Flexible and Open DRM Framework.- PPINA – A Forensic Investigation Prool for Privacy Enhancing Technologies.- A Privacy Agent in Context-Aware Ubiquitous Computing Environments.- Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems.- Attack Graph Based Evaluation of Network Security.- Information Modeling for Automated Risk Analysis.- Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >