Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom /
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, NY :
Springer US : Imprint: Springer,
2005.
|
Edición: | 1st ed. 2005. |
Colección: | IFIP Advances in Information and Communication Technology,
175 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Privacy/Anonymity
- Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion Protocols
- Personal Attributes and Privacy
- Mobile Security 1
- Local Management of Credits and Debits in Mobile Ad Hoc Networks
- How Secure are Current Mobile Operating Systems?
- An Overview of Security Issues and Techniques in Mobile Agents
- Mobile Security 2
- A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography
- Mobile Trust Negotiation
- Weak Context Establishment Procedure for Mobility and Multi-Homing Management
- Security in Microsoft .Net
- A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components
- Threat Modelling for Web Services Based Web Applications
- Threat Modelling for ASP.NET
- Threat Modelling for SQL Servers
- Threat Modelling for Active Directory
- Threat Modelling for Security Tokens in Web Applications
- Cryptography
- Analysis of the DVB Common Scrambling Algorithm
- An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder
- Multimedia Security
- Robust Visual Hashing Using JPEG 2000
- A System for End-to-End Authentication of Adaptive Multimedia Content
- Application Level Security
- Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure
- Secure Role Based Messaging
- Five Non-Technical Pillars of Network Information Security Management.