Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS'01) May 21-22, 2001, Darmstadt, Germany / Edition 1by Ralf Steinmetz
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by… See more details below
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) "IT Sicherheit" conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, the CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The CMS 1999 was held in Leuven, Belgium. This conference provides a forum for presentations and discussions on issues which combine innovative research work with a highly promising application potential in the area of security for communication and multimedia security. State-of-the-art issues as well as practical experiences and new trends in the areas were topics of interest again, as it has already been the case at previous conferences. This year, the organizers wanted to focus the attention on watermarking and copyright protection for e commerce applications and multimedia data. We also encompass excellent work on recent advances in cryptography and their applications. In recent years, digital media data have enormously gained in importance.
- Springer US
- Publication date:
- IFIP Advances in Information and Communication Technology Series, #64
- Edition description:
- Product dimensions:
- 1.06(w) x 6.14(h) x 9.21(d)
Table of ContentsPreface. Conference Committees. Web Security. What You See Is What You Sign - Trustworthy Display of XML Documents for Signing and Verification; K. Scheibelhofer. XML Electronic Signatures; G. Karlinger. An integrated secure Web architecture for protected Mobile code distribution; M. Jalali-Sohi, et al. Secure and anonymous multicast framework; N. Weiler, B. Plattner. Vulnerabilities and Security Limitations of current IP Telephony Systems; R. Ackermann, et al. Watermarking I. Quantization Watermarking in the JPEG2000 Coding Pipeline; P. Meerwald. Theoretic Performance Analysis of a Watermarking System based on Bernoulli Chaotic Sequences; S. Tsekeridou, et al. Scalable Detection of Perceptual Watermarks in JPEG2000 Images; D. Simitopoulos, et al. Cryptographic Algorithms. Collecting randomness from the net; B. Bencsath, I. Vajda. Encryption System Based on Neutral Network; C.-K. Chan, et al. A Modified Chaotic Cryptographic Method; W. Wong, et al. An Elliptic Curve Random Number Generator; I. Lee, K. Wong. Watermarking II. Conditional and User Specific Access to Services and Resources Using Annotation Watermarks; J. Dittmann, et al. Large Scale distributed watermarking of multicast media through encryption; R. Parviainen, P. Parnes. Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept; S. Craver, S. Katzenbeisser. Fingerprints for Copyright Protection; S. Encheva. System Security. Software Security Assessment through Specification Mutations and Fault Injection; R. Kaksonen, et al. Asynchronous Large-Scale Certification Based on Certificate Verification Trees; J. Domingo-Ferrer, et al. ACLA: A Framework for Access Control List (ACL) Analysis and Optimization; J. Qian, et al. Transparent Access to Encrypted Data Using Operating System Network Stack Extensions; E. Rademer, S.D. Wolthusen. A PC Cryptographic Coprocessor Based on TI Signal Processor and Smart Card System; M. Markovic, et al. Watermarking III. Optimization of Watermarking Performances Using Error Correcting Codes and Repetition; S. Zinger, et al. Using Raw Speech as a Watermark, does it work? P. Nintanavongsa, T. Amornraksa. Multiple Security Aspects. Transferability in Coin Systems with Observers; C. Fremdt, H. Neumann. Secure iLearning; F. Graf. Tree-based Multicast Key Agreement; J. Schwenk, et al. Security for the core network of third generation mobile systems; G. Horn, et al. Secure Internet Phone; P. Horster, et al. Posters. Secure Meeting Scheduling with AgenTa; T. Herlea, et al. Virtual Hidden Network; N. Shin. Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval; R. Puertpan, et al. A Prepositioned Secret Sharing Scheme for Message Authentification in Broadcast Networks; A. Eskicioglu. Secure Service Centered Networking for Nomadic Usage; M. Hollick. Last Minute Papers. A Secure Authentication Infrastructure for Mobile Communication Services over the Internet; I. Dupre la Tour, et al. Blind Compressed-Domain Watermarking for MPEG-encoded Videos; C.-L. Wu, et al. Index of Contributors.
and post it to your social network
Most Helpful Customer Reviews
See all customer reviews >