Normal view MARC view ISBD view

Communications and Multimedia Security [electronic resource] :10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006. Proceedings / edited by Herbert Leitold, Evangelos P. Markatos.

by Leitold, Herbert [editor.]; Markatos, Evangelos P [editor.]; SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 4237Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.Description: XIII, 253 p. Also available online. online resource.ISBN: 9783540478232.Subject(s): Computer science | Computer Communication Networks | Data encryption (Computer science) | Computer software | Information systems | Information Systems | Telecommunication | Computer Science | Computer Communication Networks | Data Encryption | Algorithm Analysis and Problem Complexity | Management of Computing and Information Systems | Information Systems Applications (incl.Internet) | Communications Engineering, NetworksDDC classification: 004.6 Online resources: Click here to access online
Contents:
Computing of Trust in Ad-Hoc Networks -- TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation -- On the Privacy Risks of Publishing Anonymized IP Network Traces -- Secure Mobile Notifications of Civilians in Case of a Disaster -- A Fair Anonymous Submission and Review System -- Attribute Delegation Based on Ontologies and Context Information -- Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains -- One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange -- Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart -- Perturbing and Protecting a Traceable Block Cipher -- A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors -- Timed Release Cryptography from Bilinear Pairings Using Hash Chains -- Compression of Encrypted Visual Data -- Selective Encryption for Hierarchical MPEG -- Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods -- A Flexible and Open DRM Framework -- PPINA – A Forensic Investigation Protocol for Privacy Enhancing Technologies -- A Privacy Agent in Context-Aware Ubiquitous Computing Environments -- Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems -- Attack Graph Based Evaluation of Network Security -- Information Modeling for Automated Risk Analysis -- Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.
In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 10th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, CMS 2006, held in Heraklion, Crete, Greece in October 2006. The 22 revised full papers presented were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on applied network and information security, identification and authentication, DRM and multimedia security, Web and XML security, cryptography, privacy and data protection, as well as network and information security analysis and modeling.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
MAIN LIBRARY
TK5105.5-5105.9 (Browse shelf) Available

Computing of Trust in Ad-Hoc Networks -- TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation -- On the Privacy Risks of Publishing Anonymized IP Network Traces -- Secure Mobile Notifications of Civilians in Case of a Disaster -- A Fair Anonymous Submission and Review System -- Attribute Delegation Based on Ontologies and Context Information -- Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains -- One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange -- Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart -- Perturbing and Protecting a Traceable Block Cipher -- A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors -- Timed Release Cryptography from Bilinear Pairings Using Hash Chains -- Compression of Encrypted Visual Data -- Selective Encryption for Hierarchical MPEG -- Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods -- A Flexible and Open DRM Framework -- PPINA – A Forensic Investigation Protocol for Privacy Enhancing Technologies -- A Privacy Agent in Context-Aware Ubiquitous Computing Environments -- Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems -- Attack Graph Based Evaluation of Network Security -- Information Modeling for Automated Risk Analysis -- Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.

This book constitutes the refereed proceedings of the 10th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, CMS 2006, held in Heraklion, Crete, Greece in October 2006. The 22 revised full papers presented were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on applied network and information security, identification and authentication, DRM and multimedia security, Web and XML security, cryptography, privacy and data protection, as well as network and information security analysis and modeling.

There are no comments for this item.

Log in to your account to post a comment.
@ Jomo Kenyatta University Of Agriculture and Technology Library

Powered by Koha