Coverart for item
The Resource Communications and multimedia security : proceedings, 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005 ; Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.)

Communications and multimedia security : proceedings, 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005 ; Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.)

Label
Communications and multimedia security : proceedings
Title
Communications and multimedia security
Title remainder
proceedings
Statement of responsibility
9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005 ; Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.)
Creator
Contributor
Subject
Genre
Language
eng
Member of
Cataloging source
GW5XE
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
TK5105.59
LC item number
.I34 2005b
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2005
http://bibfra.me/vocab/lite/meetingName
IFIP TC-6 TC-11 Conference on Communications and Multimedia Security
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1968-
http://library.link/vocab/relatedWorkOrContributorName
  • Dittmann, Jana
  • Katzenbeisser, Stefan
  • Uhl, Andreas
Series statement
Lecture notes in computer science,
Series volume
3677
http://library.link/vocab/subjectName
  • Computer networks
  • Telecommunication systems
  • Computer security
  • Informatique
  • Computer networks
  • Computer security
  • Telecommunication systems
  • Multimédia
  • Réseau d'ordinateurs
  • Mesures de sécurité
  • Système de télécommunication
  • Sécurité informatique
Label
Communications and multimedia security : proceedings, 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005 ; Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.)
Instantiates
Publication
Note
Proceedings of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security--Pref
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Applied Cryptography -- Fast Contract Signing with Batch Oblivious Transfer -- An Instruction Set Extension for Fast and Memory-Efficient AES Implementation -- Self-healing Key Distribution Schemes with Sponsorization -- DRM & E-Commerce -- Effective Protection Against Phishing and Web Spoofing -- Identity Based DRM: Personal Entertainment Domain -- Rights and Trust in Multimedia Information Management -- Signature Amortization Using Multiple Connected Chains -- Media Encryption -- A Key Embedded Video Codec for Secure Video Multicast -- Puzzle -- A Novel Video Encryption Algorithm -- Selective Image Encryption Using JBIG -- Multimedia Security -- On Reversibility of Random Binning Techniques: Multimedia Perspectives -- A Graph-Theoretic Approach to Steganography -- Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme -- Privacy -- Video Surveillance: A Distributed Approach to Protect Privacy -- Privacy-Preserving Electronic Health Records -- Using XACML for Privacy Control in SAML-Based Identity Federations -- Biometrics & Access Control -- Verifier-Tuple as a Classifier for Biometric Handwriting Authentication -- Combination of Syntax and Semantics -- Decentralised Access Control in 802.11 Networks -- Multimodal Biometrics for Voice and Handwriting -- Network Security -- Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks -- Polymorphic Code Detection with GA Optimized Markov Models -- A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks -- Mobile Security -- Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets -- Assessment of Palm OS Susceptibility to Malicious Code Threats -- Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication -- Work in Progress Track -- Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting -- INVUS: INtelligent VUlnerability Scanner -- Personal Rights Management- Enabling Privacy Rights in Digital Online Content -- Flexible Traitor Tracing for Anonymous Attacks -- Efficient Key Distribution for Closed Meetings in the Internet -- Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics -- Applying LR Cube Analysis to JSteg Detection -- Digital Signatures Based on Invertible Watermarks for Video Authentication -- A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents -- Semantically Extended Digital Watermarking Model for Multimedia Content -- An Architecture for Secure Policy Enforcement in E-Government Services Deployment -- Some Critical Aspects of the PKIX TSP -- Motivations for a Theoretical Approach to WYSIWYS -- Special Session: XML Security -- Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications -- Integrating XML Linked Time-Stamps in OASIS Digital Signature Services -- Trustworthy Verification and Visualisation of Multiple XML-Signatures -- Experience XML Security -- How to Make a Federation Manageable -- XML Signatures in an Enterprise Service Bus Environment -- Using the XML Key Management Specification (and Breaking X.509 Rules as You Go)
Control code
262680998
Dimensions
unknown
Extent
1 online resource (xiii, 360 pages)
Form of item
online
Isbn
9783540319788
Lccn
2005931928
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-28791-9
Specific material designation
remote
System control number
(OCoLC)262680998
Label
Communications and multimedia security : proceedings, 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005 ; Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.)
Publication
Note
Proceedings of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security--Pref
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Applied Cryptography -- Fast Contract Signing with Batch Oblivious Transfer -- An Instruction Set Extension for Fast and Memory-Efficient AES Implementation -- Self-healing Key Distribution Schemes with Sponsorization -- DRM & E-Commerce -- Effective Protection Against Phishing and Web Spoofing -- Identity Based DRM: Personal Entertainment Domain -- Rights and Trust in Multimedia Information Management -- Signature Amortization Using Multiple Connected Chains -- Media Encryption -- A Key Embedded Video Codec for Secure Video Multicast -- Puzzle -- A Novel Video Encryption Algorithm -- Selective Image Encryption Using JBIG -- Multimedia Security -- On Reversibility of Random Binning Techniques: Multimedia Perspectives -- A Graph-Theoretic Approach to Steganography -- Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme -- Privacy -- Video Surveillance: A Distributed Approach to Protect Privacy -- Privacy-Preserving Electronic Health Records -- Using XACML for Privacy Control in SAML-Based Identity Federations -- Biometrics & Access Control -- Verifier-Tuple as a Classifier for Biometric Handwriting Authentication -- Combination of Syntax and Semantics -- Decentralised Access Control in 802.11 Networks -- Multimodal Biometrics for Voice and Handwriting -- Network Security -- Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks -- Polymorphic Code Detection with GA Optimized Markov Models -- A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks -- Mobile Security -- Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets -- Assessment of Palm OS Susceptibility to Malicious Code Threats -- Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication -- Work in Progress Track -- Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting -- INVUS: INtelligent VUlnerability Scanner -- Personal Rights Management- Enabling Privacy Rights in Digital Online Content -- Flexible Traitor Tracing for Anonymous Attacks -- Efficient Key Distribution for Closed Meetings in the Internet -- Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics -- Applying LR Cube Analysis to JSteg Detection -- Digital Signatures Based on Invertible Watermarks for Video Authentication -- A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents -- Semantically Extended Digital Watermarking Model for Multimedia Content -- An Architecture for Secure Policy Enforcement in E-Government Services Deployment -- Some Critical Aspects of the PKIX TSP -- Motivations for a Theoretical Approach to WYSIWYS -- Special Session: XML Security -- Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications -- Integrating XML Linked Time-Stamps in OASIS Digital Signature Services -- Trustworthy Verification and Visualisation of Multiple XML-Signatures -- Experience XML Security -- How to Make a Federation Manageable -- XML Signatures in an Enterprise Service Bus Environment -- Using the XML Key Management Specification (and Breaking X.509 Rules as You Go)
Control code
262680998
Dimensions
unknown
Extent
1 online resource (xiii, 360 pages)
Form of item
online
Isbn
9783540319788
Lccn
2005931928
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-28791-9
Specific material designation
remote
System control number
(OCoLC)262680998

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...