E-Book, Englisch, Band 2828, 268 Seiten, eBook
Lioy / Mazzocchi Communications and Multimedia Security. Advanced Techniques for Network and Data Protection
Erscheinungsjahr 2003
ISBN: 978-3-540-45184-6
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings
E-Book, Englisch, Band 2828, 268 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-45184-6
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Cryptography.- Computation of Cryptographic Keys from Face Biometrics.- AUTHMAC_DH: A New Protocol for Authentication and Key Distribution.- Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection.- Network Security.- Securing the Border Gateway Protocol: A Status Update.- Towards an IPv6-Based Security Framework for Distributed Storage Resources.- Operational Characteristics of an Automated Intrusion Response System.- Mobile and Wireless Network Security.- A Secure Multimedia System in Emerging Wireless Home Networks.- Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents.- A Security Scheme for Mobile Agent Platforms in Large-Scale Systems.- Trust and Privacy.- Privacy and Trust in Distributed Networks.- Extending the SDSI / SPKI Model through Federation Webs.- Trust- : An XML Framework for Trust Negotiations.- Application Security.- How to Specify Security Services: A Practical Approach.- Application Level Smart Card Support through Networked Mobile Devices.- Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage.- Multimedia Security.- Selective Encryption of the JPEG2000 Bitstream.- Robust Spatial Data Hiding for Color Images.- Watermark Security via Secret Wavelet Packet Subband Structures.- A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression.- Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs.- Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization.