Cantitate/Preț
Produs

Communications and Multimedia Security: 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings: Lecture Notes in Computer Science, cartea 3677

Editat de Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl
en Limba Engleză Paperback – 6 sep 2005

Din seria Lecture Notes in Computer Science

Preț: 37236 lei

Nou

Puncte Express: 559

Preț estimativ în valută:
7131 7699$ 5939£

Carte tipărită la comandă

Livrare economică 06-20 decembrie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540287919
ISBN-10: 3540287914
Pagini: 380
Ilustrații: XIII, 360 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.53 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Applied Cryptography.- Fast Contract Signing with Batch Oblivious Transfer.- An Instruction Set Extension for Fast and Memory-Efficient AES Implementation.- Self-healing Key Distribution Schemes with Sponsorization.- DRM & E-Commerce.- Effective Protection Against Phishing and Web Spoofing.- Identity Based DRM: Personal Entertainment Domain.- Rights and Trust in Multimedia Information Management.- Signature Amortization Using Multiple Connected Chains.- Media Encryption.- A Key Embedded Video Codec for Secure Video Multicast.- Puzzle – A Novel Video Encryption Algorithm.- Selective Image Encryption Using JBIG.- Multimedia Security.- On Reversibility of Random Binning Techniques: Multimedia Perspectives.- A Graph–Theoretic Approach to Steganography.- Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme.- Privacy.- Video Surveillance: A Distributed Approach to Protect Privacy.- Privacy-Preserving Electronic Health Records.- Using XACML for Privacy Control in SAML-Based Identity Federations.- Biometrics & Access Control.- Verifier-Tuple as a Classifier for Biometric Handwriting Authentication – Combination of Syntax and Semantics.- Decentralised Access Control in 802.11 Networks.- Multimodal Biometrics for Voice and Handwriting.- Network Security.- Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks.- Polymorphic Code Detection with GA Optimized Markov Models.- A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks.- Mobile Security.- Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets.- Assessment of Palm OS Susceptibility to Malicious Code Threats.- Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication.- Work inProgress Track.- Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting.- INVUS: INtelligent VUlnerability Scanner.- Personal Rights Management– Enabling Privacy Rights in Digital Online Content.- Flexible Traitor Tracing for Anonymous Attacks.- Efficient Key Distribution for Closed Meetings in the Internet.- Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics.- Applying LR Cube Analysis to JSteg Detection.- Digital Signatures Based on Invertible Watermarks for Video Authentication.- A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents.- Semantically Extended Digital Watermarking Model for Multimedia Content.- An Architecture for Secure Policy Enforcement in E-Government Services Deployment.- Some Critical Aspects of the PKIX TSP.- Motivations for a Theoretical Approach to WYSIWYS.- Special Session: XML Security.- Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications.- Integrating XML Linked Time-Stamps in OASIS Digital Signature Services.- Trustworthy Verification and Visualisation of Multiple XML-Signatures.- Experience XML Security.- How to Make a Federation Manageable.- XML Signatures in an Enterprise Service Bus Environment.- Using the XML Key Management Specification (and Breaking X.509 Rules as You Go).