Communications and Multimedia Security 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010, Proceedings /
Over the last decade, we have witnessed a growing dependency on information technologyresultingina wide rangeofnew opportunities. Clearly,ithas become almost impossible to imagine life without a personal computer or laptop, or without a cell phone. Social network sites (SNS) are competing with face-...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Security and Cryptology ;
6109 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Keynotes
- Keynotes
- WiFi and RF Security
- A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks
- Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion
- XML and Web Services Security
- Throwing a MonkeyWrench into Web Attackers Plans
- Security in OpenSocial-Instrumented Social Networking Services
- Security for XML Data Binding
- Watermarking and Multimedia Security
- Watermark Detection for Video Bookmarking Using Mobile Phone Camera
- Watermark-Based Authentication and Key Exchange in Teleconferencing Systems
- Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking
- Analysis and Detection of Malicious Code and Risk Management
- Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
- A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)
- Business and IT Continuity Benchmarking
- VoIP Security
- Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks
- SIP Proxies: New Reflectors in the Internet
- Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal
- Biometrics
- Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication
- Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction
- Privacy Preserving Key Generation for Iris Biometrics
- Applied Cryptography
- Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare
- Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
- Detecting Hidden Encrypted Volumes
- Secure Communications
- Tor HTTP Usage and Information Leakage
- Secure Communication Using Identity Based Encryption
- Anonymous Client Authentication for Transport Layer Security.