


default search action
9th Communications and Multimedia Security 2005: Salzburg, Austria
- Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl:

Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings. Lecture Notes in Computer Science 3677, Springer 2005, ISBN 3-540-28791-4
Applied Cryptography
- Lubica Staneková, Martin Stanek:

Fast Contract Signing with Batch Oblivious Transfer. 1-10 - Stefan Tillich, Johann Großschädl, Alexander Szekely:

An Instruction Set Extension for Fast and Memory-Efficient AES Implementation. 11-21 - Germán Sáez:

Self-healing Key Distribution Schemes with Sponsorization. 22-31
DRM & E-Commerce
- Rolf Oppliger, Sebastian Gajek:

Effective Protection Against Phishing and Web Spoofing. 32-41 - R. Paul Koster, Frank Kamperman, Peter Lenoir, Koen Vrielink:

Identity Based DRM: Personal Entertainment Domain. 42-54 - Jaime Delgado

, Víctor Torres, Silvia Llorente
, Eva Rodríguez:
Rights and Trust in Multimedia Information Management. 55-64 - Qusai Abuein

, Susumu Shibusawa:
Signature Amortization Using Multiple Connected Chains. 65-76
Media Encryption
- Hao Yin, Chuang Lin, Feng Qiu, Xiaowen Chu

, Geyong Min:
A Key Embedded Video Codec for Secure Video Multicast. 77-87 - Fuwen Liu, Hartmut König:

Puzzle - A Novel Video Encryption Algorithm. 88-97 - Roman Pfarrhofer, Andreas Uhl:

Selective Image Encryption Using JBIG. 98-107
Multimedia Security
- Sviatoslav Voloshynovskiy

, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Pedro Comesaña Alfaro, Thierry Pun:
On Reversibility of Random Binning Techniques: Multimedia Perspectives. 108-118 - Stefan Hetzl

, Petra Mutzel
:
A Graph-Theoretic Approach to Steganography. 119-128 - André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi:

Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme. 129-139
Privacy
- Martin Schaffer, Peter Schartner:

Video Surveillance: A Distributed Approach to Protect Privacy. 140-149 - Liesje Demuynck, Bart De Decker:

Privacy-Preserving Electronic Health Records. 150-159 - Wolfgang Hommel:

Using XACML for Privacy Control in SAML-Based Identity Federations. 160-169
Biometrics & Access Control
- Andrea Oermann, Jana Dittmann, Claus Vielhauer:

Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics. 170-179 - Marco Domenico Aime, Antonio Lioy

, Gianluca Ramunno:
Decentralised Access Control in 802.11 Networks. 180-190 - Claus Vielhauer, Tobias Scheidat:

Multimodal Biometrics for Voice and Handwriting. 191-199
Network Security
- Huafei Zhu, Feng Bao, Tieyan Li:

Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks. 200-209 - Udo Payer, Stefan Kraxberger:

Polymorphic Code Detection with GA Optimized Markov Models. 210-219 - Minsoo Lee, Sehyun Park:

A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks. 220-229
Mobile Security
- Wiebke Dresp:

Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets. 230-239 - Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen:

Assessment of Palm OS Susceptibility to Malicious Code Threats. 240-249 - HyunGon Kim, ByeongKyun Oh:

Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication. 250-260
Work in Progress Track
- Sascha Schimke, Athanasios Valsamakis, Claus Vielhauer, Yannis Stylianou:

Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting. 261-263 - Turker Akyuz, Ibrahim Sogukpinar

:
INVUS: INtelligent VUlnerability Scanner. 264-265 - Mina Deng, Lothar Fritsch, Klaus Kursawe:

Personal Rights Management- Enabling Privacy Rights in Digital Online Content. 266-268 - Hongxia Jin, Jeffery Lotspiech:

Flexible Traitor Tracing for Anonymous Attacks. 269-270 - Fuwen Liu, Hartmut König:

Efficient Key Distribution for Closed Meetings in the Internet. 271-272 - Taras Holotyak

, Jessica J. Fridrich, Sviatoslav Voloshynovskiy
:
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics. 273-274 - Kwangsoo Lee, Changho Jung, Sangjin Lee, HyungJun Kim, Jongin Lim:

Applying LR Cube Analysis to JSteg Detection. 275-276 - Enrico Hauer, Jana Dittmann, Martin Steinebach:

Digital Signatures Based on Invertible Watermarks for Video Authentication. 277-279 - Renato Villán, Sviatoslav Voloshynovskiy

, Frédéric Deguillaume, Yuriy B. Rytsar, Oleksiy J. Koval, Emre Topak, E. Rivera, Thierry Pun:
A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents. 280-281 - Huajian Liu, Lucilla Croce Ferri, Martin Steinebach:

Semantically Extended Digital Watermarking Model for Multimedia Content. 282-283 - Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland

:
An Architecture for Secure Policy Enforcement in E-Government Services Deployment. 284-285 - Cristian Marinescu, Nicolae Tapus

:
Some Critical Aspects of the PKIX TSP. 286-288 - Antonio Lioy

, Gianluca Ramunno, Marco Domenico Aime, Massimiliano Pala:
Motivations for a Theoretical Approach to WYSIWYS. 289-290
Special Session: XML Security
- Lars Ewers, Wolfgang Kubbilun, Lijun Liao, Jörg Schwenk:

Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications. 291-300 - Ana Isabel González-Tablas Ferreres, Karel Wouters:

Integrating XML Linked Time-Stamps in OASIS Digital Signature Services. 301-310 - Wolfgang Kubbilun, Sebastian Gajek, Michael Psarros, Jörg Schwenk:

Trustworthy Verification and Visualisation of Multiple XML-Signatures. 311-320 - Dominik Schadow:

Experience XML Security. 321-329 - Christian Geuer-Pollmann:

How to Make a Federation Manageable. 330-338 - Eckehard Hermann, Dieter Kessler:

XML Signatures in an Enterprise Service Bus Environment. 339-347 - Stephen Farrell, José Kahan:

Using the XML Key Management Specification (and Breaking X.509 Rules as You Go). 348-357

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














