Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cms/cms2010.bht:"
@inproceedings{DBLP:conf/cms/Al-KuwariW10, author = {Saif M. Al{-}Kuwari and Stephen D. Wolthusen}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {16--27}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_3}, doi = {10.1007/978-3-642-13241-4\_3}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/Al-KuwariW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/BattistelloD10, author = {Patrick Battistello and Cyril Del{\'{e}}tr{\'{e}}}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {154--165}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_15}, doi = {10.1007/978-3-642-13241-4\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/BattistelloD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/BuscherMB10, author = {Armin B{\"{u}}scher and Michael Meier and Ralf Benzm{\"{u}}ller}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Throwing a MonkeyWrench into Web Attackers Plans}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {28--39}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_4}, doi = {10.1007/978-3-642-13241-4\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/BuscherMB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/Dietrich10, author = {Kurt Dietrich}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Anonymous Client Authentication for Transport Layer Security}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {268--280}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_24}, doi = {10.1007/978-3-642-13241-4\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/Dietrich10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/GruschkaI10, author = {Nils Gruschka and Luigi Lo Iacono}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Security for {XML} Data Binding}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {53--63}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_6}, doi = {10.1007/978-3-642-13241-4\_6}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/GruschkaI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/HargreavesC10, author = {Christopher James Hargreaves and Howard Chivers}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Detecting Hidden Encrypted Volumes}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {233--244}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_21}, doi = {10.1007/978-3-642-13241-4\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/HargreavesC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/HaselI10, author = {Matthias H{\"{a}}sel and Luigi Lo Iacono}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Security in OpenSocial-Instrumented Social Networking Services}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {40--52}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_5}, doi = {10.1007/978-3-642-13241-4\_5}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/HaselI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/HuberMW10, author = {Markus Huber and Martin Mulazzani and Edgar R. Weippl}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Tor {HTTP} Usage and Information Leakage}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {245--255}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_22}, doi = {10.1007/978-3-642-13241-4\_22}, timestamp = {Thu, 02 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/HuberMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/KummelVSFD10, author = {Karl K{\"{u}}mmel and Claus Vielhauer and Tobias Scheidat and Dirk Franke and Jana Dittmann}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Handwriting Biometric Hash Attack: {A} Genetic Algorithm with User Interaction for Raw Data Reconstruction}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {178--190}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_17}, doi = {10.1007/978-3-642-13241-4\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/KummelVSFD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/MeerwaldU10, author = {Peter Meerwald and Andreas Uhl}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Watermark Detection for Video Bookmarking Using Mobile Phone Camera}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {64--74}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_7}, doi = {10.1007/978-3-642-13241-4\_7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cms/MeerwaldU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/MerkelHKD10, author = {Ronny Merkel and Tobias Hoppe and Christian Kr{\"{a}}tzer and Jana Dittmann}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Statistical Detection of Malicious PE-Executables for Fast Offline Analysis}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {93--105}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_10}, doi = {10.1007/978-3-642-13241-4\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/MerkelHKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/NeudorferMS10, author = {Wolfgang Neudorfer and Louis Marinos and Ingrid Schaum{\"{u}}ller{-}Bichl}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Business and {IT} Continuity Benchmarking}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {118--129}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_12}, doi = {10.1007/978-3-642-13241-4\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/NeudorferMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/RaczWS10, author = {Nicolas Racz and Edgar R. Weippl and Andreas Seufert}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {A Frame of Reference for Research of Integrated Governance, Risk and Compliance {(GRC)}}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {106--117}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_11}, doi = {10.1007/978-3-642-13241-4\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/RaczWS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/RassSK10, author = {Stefan Rass and David Schuller and Christian Kollmitzer}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {166--177}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_16}, doi = {10.1007/978-3-642-13241-4\_16}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cms/RassSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/RathgebU10, author = {Christian Rathgeb and Andreas Uhl}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Privacy Preserving Key Generation for Iris Biometrics}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {191--200}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_18}, doi = {10.1007/978-3-642-13241-4\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/RathgebU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/RoschkeICM10, author = {Sebastian Roschke and Luan Ibraimi and Feng Cheng and Christoph Meinel}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Secure Communication Using Identity Based Encryption}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {256--267}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_23}, doi = {10.1007/978-3-642-13241-4\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/RoschkeICM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/RuhrmairKSZ10, author = {Ulrich R{\"{u}}hrmair and Stefan Katzenbeisser and Martin Steinebach and Sascha Zmudzinski}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Watermark-Based Authentication and Key Exchange in Teleconferencing Systems}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {75--80}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_8}, doi = {10.1007/978-3-642-13241-4\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/RuhrmairKSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/SaxenaS10, author = {Amitabh Saxena and Ben Soh}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {4--15}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_2}, doi = {10.1007/978-3-642-13241-4\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/SaxenaS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/SlamanigR10, author = {Daniel Slamanig and Stefan Rass}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {201--213}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_19}, doi = {10.1007/978-3-642-13241-4\_19}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cms/SlamanigR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/StutzU10, author = {Thomas St{\"{u}}tz and Andreas Uhl}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {81--92}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_9}, doi = {10.1007/978-3-642-13241-4\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/StutzU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/SurJPR10, author = {Chul Sur and Chae Duk Jung and Youngho Park and Kyung Hyune Rhee}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {214--232}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_20}, doi = {10.1007/978-3-642-13241-4\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/SurJPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/ZhangF10, author = {Ge Zhang and Simone Fischer{-}H{\"{u}}bner}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {130--141}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_13}, doi = {10.1007/978-3-642-13241-4\_13}, timestamp = {Fri, 05 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/ZhangF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/ZhangPRF10, author = {Ge Zhang and Jordi Jaen Pallares and Yacine Rebahi and Simone Fischer{-}H{\"{u}}bner}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {{SIP} Proxies: New Reflectors in the Internet}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {142--153}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_14}, doi = {10.1007/978-3-642-13241-4\_14}, timestamp = {Fri, 05 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/ZhangPRF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cms/2010, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4}, doi = {10.1007/978-3-642-13241-4}, isbn = {978-3-642-13240-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.