Cargando…

Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom /

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Chadwick, David (Editor ), Preneel, Bart (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Colección:IFIP Advances in Information and Communication Technology, 175
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Privacy/Anonymity
  • Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion Protocols
  • Personal Attributes and Privacy
  • Mobile Security 1
  • Local Management of Credits and Debits in Mobile Ad Hoc Networks
  • How Secure are Current Mobile Operating Systems?
  • An Overview of Security Issues and Techniques in Mobile Agents
  • Mobile Security 2
  • A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography
  • Mobile Trust Negotiation
  • Weak Context Establishment Procedure for Mobility and Multi-Homing Management
  • Security in Microsoft .Net
  • A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components
  • Threat Modelling for Web Services Based Web Applications
  • Threat Modelling for ASP.NET
  • Threat Modelling for SQL Servers
  • Threat Modelling for Active Directory
  • Threat Modelling for Security Tokens in Web Applications
  • Cryptography
  • Analysis of the DVB Common Scrambling Algorithm
  • An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder
  • Multimedia Security
  • Robust Visual Hashing Using JPEG 2000
  • A System for End-to-End Authentication of Adaptive Multimedia Content
  • Application Level Security
  • Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure
  • Secure Role Based Messaging
  • Five Non-Technical Pillars of Network Information Security Management.