The Resource Communications and multimedia security : proceedings, 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005 ; Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.)
Communications and multimedia security : proceedings, 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005 ; Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.)
Resource Information
The item Communications and multimedia security : proceedings, 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005 ; Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Communications and multimedia security : proceedings, 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005 ; Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Language
- eng
- Extent
- 1 online resource (xiii, 360 pages)
- Note
- Proceedings of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security--Pref
- Contents
-
- Applied Cryptography
- Fast Contract Signing with Batch Oblivious Transfer
- An Instruction Set Extension for Fast and Memory-Efficient AES Implementation
- Self-healing Key Distribution Schemes with Sponsorization
- DRM & E-Commerce
- Effective Protection Against Phishing and Web Spoofing
- Identity Based DRM: Personal Entertainment Domain
- Rights and Trust in Multimedia Information Management
- Signature Amortization Using Multiple Connected Chains
- Media Encryption
- A Key Embedded Video Codec for Secure Video Multicast
- Puzzle
- A Novel Video Encryption Algorithm
- Selective Image Encryption Using JBIG
- Multimedia Security
- On Reversibility of Random Binning Techniques: Multimedia Perspectives
- A Graph-Theoretic Approach to Steganography
- Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme
- Privacy
- Video Surveillance: A Distributed Approach to Protect Privacy
- Privacy-Preserving Electronic Health Records
- Using XACML for Privacy Control in SAML-Based Identity Federations
- Biometrics & Access Control
- Verifier-Tuple as a Classifier for Biometric Handwriting Authentication
- Combination of Syntax and Semantics
- Decentralised Access Control in 802.11 Networks
- Multimodal Biometrics for Voice and Handwriting
- Network Security
- Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks
- Polymorphic Code Detection with GA Optimized Markov Models
- A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks
- Mobile Security
- Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets
- Assessment of Palm OS Susceptibility to Malicious Code Threats
- Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication
- Work in Progress Track
- Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting
- INVUS: INtelligent VUlnerability Scanner
- Personal Rights Management- Enabling Privacy Rights in Digital Online Content
- Flexible Traitor Tracing for Anonymous Attacks
- Efficient Key Distribution for Closed Meetings in the Internet
- Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics
- Applying LR Cube Analysis to JSteg Detection
- Digital Signatures Based on Invertible Watermarks for Video Authentication
- A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents
- Semantically Extended Digital Watermarking Model for Multimedia Content
- An Architecture for Secure Policy Enforcement in E-Government Services Deployment
- Some Critical Aspects of the PKIX TSP
- Motivations for a Theoretical Approach to WYSIWYS
- Special Session: XML Security
- Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications
- Integrating XML Linked Time-Stamps in OASIS Digital Signature Services
- Trustworthy Verification and Visualisation of Multiple XML-Signatures
- Experience XML Security
- How to Make a Federation Manageable
- XML Signatures in an Enterprise Service Bus Environment
- Using the XML Key Management Specification (and Breaking X.509 Rules as You Go)
- Isbn
- 9783540319788
- Label
- Communications and multimedia security : proceedings
- Title
- Communications and multimedia security
- Title remainder
- proceedings
- Statement of responsibility
- 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005 ; Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.)
- Subject
-
- Computer networks -- Security measures
- Computer networks -- Security measures -- Congresses
- Computer security
- Computer security
- Computer security -- Congresses
- Conference papers and proceedings
- Conference papers and proceedings
- Informatique
- Mesures de sécurité
- Multimédia
- Réseau d'ordinateurs
- Système de télécommunication
- Sécurité informatique
- Telecommunication systems -- Security measures
- Telecommunication systems -- Security measures
- Telecommunication systems -- Security measures -- Congresses
- Computer networks -- Security measures
- Language
- eng
- Cataloging source
- GW5XE
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- TK5105.59
- LC item number
- .I34 2005b
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2005
- http://bibfra.me/vocab/lite/meetingName
- IFIP TC-6 TC-11 Conference on Communications and Multimedia Security
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorDate
- 1968-
- http://library.link/vocab/relatedWorkOrContributorName
-
- Dittmann, Jana
- Katzenbeisser, Stefan
- Uhl, Andreas
- Series statement
- Lecture notes in computer science,
- Series volume
- 3677
- http://library.link/vocab/subjectName
-
- Computer networks
- Telecommunication systems
- Computer security
- Informatique
- Computer networks
- Computer security
- Telecommunication systems
- Multimédia
- Réseau d'ordinateurs
- Mesures de sécurité
- Système de télécommunication
- Sécurité informatique
- Label
- Communications and multimedia security : proceedings, 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005 ; Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.)
- Note
- Proceedings of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security--Pref
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Applied Cryptography -- Fast Contract Signing with Batch Oblivious Transfer -- An Instruction Set Extension for Fast and Memory-Efficient AES Implementation -- Self-healing Key Distribution Schemes with Sponsorization -- DRM & E-Commerce -- Effective Protection Against Phishing and Web Spoofing -- Identity Based DRM: Personal Entertainment Domain -- Rights and Trust in Multimedia Information Management -- Signature Amortization Using Multiple Connected Chains -- Media Encryption -- A Key Embedded Video Codec for Secure Video Multicast -- Puzzle -- A Novel Video Encryption Algorithm -- Selective Image Encryption Using JBIG -- Multimedia Security -- On Reversibility of Random Binning Techniques: Multimedia Perspectives -- A Graph-Theoretic Approach to Steganography -- Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme -- Privacy -- Video Surveillance: A Distributed Approach to Protect Privacy -- Privacy-Preserving Electronic Health Records -- Using XACML for Privacy Control in SAML-Based Identity Federations -- Biometrics & Access Control -- Verifier-Tuple as a Classifier for Biometric Handwriting Authentication -- Combination of Syntax and Semantics -- Decentralised Access Control in 802.11 Networks -- Multimodal Biometrics for Voice and Handwriting -- Network Security -- Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks -- Polymorphic Code Detection with GA Optimized Markov Models -- A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks -- Mobile Security -- Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets -- Assessment of Palm OS Susceptibility to Malicious Code Threats -- Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication -- Work in Progress Track -- Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting -- INVUS: INtelligent VUlnerability Scanner -- Personal Rights Management- Enabling Privacy Rights in Digital Online Content -- Flexible Traitor Tracing for Anonymous Attacks -- Efficient Key Distribution for Closed Meetings in the Internet -- Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics -- Applying LR Cube Analysis to JSteg Detection -- Digital Signatures Based on Invertible Watermarks for Video Authentication -- A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents -- Semantically Extended Digital Watermarking Model for Multimedia Content -- An Architecture for Secure Policy Enforcement in E-Government Services Deployment -- Some Critical Aspects of the PKIX TSP -- Motivations for a Theoretical Approach to WYSIWYS -- Special Session: XML Security -- Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications -- Integrating XML Linked Time-Stamps in OASIS Digital Signature Services -- Trustworthy Verification and Visualisation of Multiple XML-Signatures -- Experience XML Security -- How to Make a Federation Manageable -- XML Signatures in an Enterprise Service Bus Environment -- Using the XML Key Management Specification (and Breaking X.509 Rules as You Go)
- Control code
- 262680998
- Dimensions
- unknown
- Extent
- 1 online resource (xiii, 360 pages)
- Form of item
- online
- Isbn
- 9783540319788
- Lccn
- 2005931928
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-28791-9
- Specific material designation
- remote
- System control number
- (OCoLC)262680998
- Label
- Communications and multimedia security : proceedings, 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005 ; Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.)
- Note
- Proceedings of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security--Pref
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Applied Cryptography -- Fast Contract Signing with Batch Oblivious Transfer -- An Instruction Set Extension for Fast and Memory-Efficient AES Implementation -- Self-healing Key Distribution Schemes with Sponsorization -- DRM & E-Commerce -- Effective Protection Against Phishing and Web Spoofing -- Identity Based DRM: Personal Entertainment Domain -- Rights and Trust in Multimedia Information Management -- Signature Amortization Using Multiple Connected Chains -- Media Encryption -- A Key Embedded Video Codec for Secure Video Multicast -- Puzzle -- A Novel Video Encryption Algorithm -- Selective Image Encryption Using JBIG -- Multimedia Security -- On Reversibility of Random Binning Techniques: Multimedia Perspectives -- A Graph-Theoretic Approach to Steganography -- Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme -- Privacy -- Video Surveillance: A Distributed Approach to Protect Privacy -- Privacy-Preserving Electronic Health Records -- Using XACML for Privacy Control in SAML-Based Identity Federations -- Biometrics & Access Control -- Verifier-Tuple as a Classifier for Biometric Handwriting Authentication -- Combination of Syntax and Semantics -- Decentralised Access Control in 802.11 Networks -- Multimodal Biometrics for Voice and Handwriting -- Network Security -- Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks -- Polymorphic Code Detection with GA Optimized Markov Models -- A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks -- Mobile Security -- Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets -- Assessment of Palm OS Susceptibility to Malicious Code Threats -- Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication -- Work in Progress Track -- Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting -- INVUS: INtelligent VUlnerability Scanner -- Personal Rights Management- Enabling Privacy Rights in Digital Online Content -- Flexible Traitor Tracing for Anonymous Attacks -- Efficient Key Distribution for Closed Meetings in the Internet -- Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics -- Applying LR Cube Analysis to JSteg Detection -- Digital Signatures Based on Invertible Watermarks for Video Authentication -- A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents -- Semantically Extended Digital Watermarking Model for Multimedia Content -- An Architecture for Secure Policy Enforcement in E-Government Services Deployment -- Some Critical Aspects of the PKIX TSP -- Motivations for a Theoretical Approach to WYSIWYS -- Special Session: XML Security -- Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications -- Integrating XML Linked Time-Stamps in OASIS Digital Signature Services -- Trustworthy Verification and Visualisation of Multiple XML-Signatures -- Experience XML Security -- How to Make a Federation Manageable -- XML Signatures in an Enterprise Service Bus Environment -- Using the XML Key Management Specification (and Breaking X.509 Rules as You Go)
- Control code
- 262680998
- Dimensions
- unknown
- Extent
- 1 online resource (xiii, 360 pages)
- Form of item
- online
- Isbn
- 9783540319788
- Lccn
- 2005931928
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-28791-9
- Specific material designation
- remote
- System control number
- (OCoLC)262680998
Subject
- Computer networks -- Security measures
- Computer networks -- Security measures -- Congresses
- Computer security
- Computer security
- Computer security -- Congresses
- Conference papers and proceedings
- Conference papers and proceedings
- Informatique
- Mesures de sécurité
- Multimédia
- Réseau d'ordinateurs
- Système de télécommunication
- Sécurité informatique
- Telecommunication systems -- Security measures
- Telecommunication systems -- Security measures
- Telecommunication systems -- Security measures -- Congresses
- Computer networks -- Security measures
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Communications-and-multimedia-security-/TaX7COjW-nA/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Communications-and-multimedia-security-/TaX7COjW-nA/">Communications and multimedia security : proceedings, 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005 ; Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Communications and multimedia security : proceedings, 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005 ; Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Communications-and-multimedia-security-/TaX7COjW-nA/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Communications-and-multimedia-security-/TaX7COjW-nA/">Communications and multimedia security : proceedings, 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005 ; Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>