default search action
9th Communications and Multimedia Security 2005: Salzburg, Austria
- Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl:
Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings. Lecture Notes in Computer Science 3677, Springer 2005, ISBN 3-540-28791-4
Applied Cryptography
- Lubica Staneková, Martin Stanek:
Fast Contract Signing with Batch Oblivious Transfer. 1-10 - Stefan Tillich, Johann Großschädl, Alexander Szekely:
An Instruction Set Extension for Fast and Memory-Efficient AES Implementation. 11-21 - Germán Sáez:
Self-healing Key Distribution Schemes with Sponsorization. 22-31
DRM & E-Commerce
- Rolf Oppliger, Sebastian Gajek:
Effective Protection Against Phishing and Web Spoofing. 32-41 - R. Paul Koster, Frank Kamperman, Peter Lenoir, Koen Vrielink:
Identity Based DRM: Personal Entertainment Domain. 42-54 - Jaime Delgado, Víctor Torres, Silvia Llorente, Eva Rodríguez:
Rights and Trust in Multimedia Information Management. 55-64 - Qusai Abuein, Susumu Shibusawa:
Signature Amortization Using Multiple Connected Chains. 65-76
Media Encryption
- Hao Yin, Chuang Lin, Feng Qiu, Xiaowen Chu, Geyong Min:
A Key Embedded Video Codec for Secure Video Multicast. 77-87 - Fuwen Liu, Hartmut König:
Puzzle - A Novel Video Encryption Algorithm. 88-97 - Roman Pfarrhofer, Andreas Uhl:
Selective Image Encryption Using JBIG. 98-107
Multimedia Security
- Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Pedro Comesaña Alfaro, Thierry Pun:
On Reversibility of Random Binning Techniques: Multimedia Perspectives. 108-118 - Stefan Hetzl, Petra Mutzel:
A Graph-Theoretic Approach to Steganography. 119-128 - André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi:
Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme. 129-139
Privacy
- Martin Schaffer, Peter Schartner:
Video Surveillance: A Distributed Approach to Protect Privacy. 140-149 - Liesje Demuynck, Bart De Decker:
Privacy-Preserving Electronic Health Records. 150-159 - Wolfgang Hommel:
Using XACML for Privacy Control in SAML-Based Identity Federations. 160-169
Biometrics & Access Control
- Andrea Oermann, Jana Dittmann, Claus Vielhauer:
Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics. 170-179 - Marco Domenico Aime, Antonio Lioy, Gianluca Ramunno:
Decentralised Access Control in 802.11 Networks. 180-190 - Claus Vielhauer, Tobias Scheidat:
Multimodal Biometrics for Voice and Handwriting. 191-199
Network Security
- Huafei Zhu, Feng Bao, Tieyan Li:
Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks. 200-209 - Udo Payer, Stefan Kraxberger:
Polymorphic Code Detection with GA Optimized Markov Models. 210-219 - Minsoo Lee, Sehyun Park:
A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks. 220-229
Mobile Security
- Wiebke Dresp:
Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets. 230-239 - Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen:
Assessment of Palm OS Susceptibility to Malicious Code Threats. 240-249 - HyunGon Kim, ByeongKyun Oh:
Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication. 250-260
Work in Progress Track
- Sascha Schimke, Athanasios Valsamakis, Claus Vielhauer, Yannis Stylianou:
Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting. 261-263 - Turker Akyuz, Ibrahim Sogukpinar:
INVUS: INtelligent VUlnerability Scanner. 264-265 - Mina Deng, Lothar Fritsch, Klaus Kursawe:
Personal Rights Management- Enabling Privacy Rights in Digital Online Content. 266-268 - Hongxia Jin, Jeffery Lotspiech:
Flexible Traitor Tracing for Anonymous Attacks. 269-270 - Fuwen Liu, Hartmut König:
Efficient Key Distribution for Closed Meetings in the Internet. 271-272 - Taras Holotyak, Jessica J. Fridrich, Sviatoslav Voloshynovskiy:
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics. 273-274 - Kwangsoo Lee, Changho Jung, Sangjin Lee, HyungJun Kim, Jongin Lim:
Applying LR Cube Analysis to JSteg Detection. 275-276 - Enrico Hauer, Jana Dittmann, Martin Steinebach:
Digital Signatures Based on Invertible Watermarks for Video Authentication. 277-279 - Renato Villán, Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Yuriy B. Rytsar, Oleksiy J. Koval, Emre Topak, E. Rivera, Thierry Pun:
A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents. 280-281 - Huajian Liu, Lucilla Croce Ferri, Martin Steinebach:
Semantically Extended Digital Watermarking Model for Multimedia Content. 282-283 - Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland:
An Architecture for Secure Policy Enforcement in E-Government Services Deployment. 284-285 - Cristian Marinescu, Nicolae Tapus:
Some Critical Aspects of the PKIX TSP. 286-288 - Antonio Lioy, Gianluca Ramunno, Marco Domenico Aime, Massimiliano Pala:
Motivations for a Theoretical Approach to WYSIWYS. 289-290
Special Session: XML Security
- Lars Ewers, Wolfgang Kubbilun, Lijun Liao, Jörg Schwenk:
Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications. 291-300 - Ana Isabel González-Tablas Ferreres, Karel Wouters:
Integrating XML Linked Time-Stamps in OASIS Digital Signature Services. 301-310 - Wolfgang Kubbilun, Sebastian Gajek, Michael Psarros, Jörg Schwenk:
Trustworthy Verification and Visualisation of Multiple XML-Signatures. 311-320 - Dominik Schadow:
Experience XML Security. 321-329 - Christian Geuer-Pollmann:
How to Make a Federation Manageable. 330-338 - Eckehard Hermann, Dieter Kessler:
XML Signatures in an Enterprise Service Bus Environment. 339-347 - Stephen Farrell, José Kahan:
Using the XML Key Management Specification (and Breaking X.509 Rules as You Go). 348-357
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.