Cargando…

Communications and Multimedia Security 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010, Proceedings /

Over the last decade, we have witnessed a growing dependency on information technologyresultingina wide rangeofnew opportunities. Clearly,ithas become almost impossible to imagine life without a personal computer or laptop, or without a cell phone. Social network sites (SNS) are competing with face-...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: De Decker, Bart (Editor ), Schaumüller-Bichl, Ingrid (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Security and Cryptology ; 6109
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Keynotes
  • Keynotes
  • WiFi and RF Security
  • A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks
  • Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion
  • XML and Web Services Security
  • Throwing a MonkeyWrench into Web Attackers Plans
  • Security in OpenSocial-Instrumented Social Networking Services
  • Security for XML Data Binding
  • Watermarking and Multimedia Security
  • Watermark Detection for Video Bookmarking Using Mobile Phone Camera
  • Watermark-Based Authentication and Key Exchange in Teleconferencing Systems
  • Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking
  • Analysis and Detection of Malicious Code and Risk Management
  • Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
  • A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)
  • Business and IT Continuity Benchmarking
  • VoIP Security
  • Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks
  • SIP Proxies: New Reflectors in the Internet
  • Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal
  • Biometrics
  • Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication
  • Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction
  • Privacy Preserving Key Generation for Iris Biometrics
  • Applied Cryptography
  • Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare
  • Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
  • Detecting Hidden Encrypted Volumes
  • Secure Communications
  • Tor HTTP Usage and Information Leakage
  • Secure Communication Using Identity Based Encryption
  • Anonymous Client Authentication for Transport Layer Security.