Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection -

Communications and Multimedia Security. Advanced Techniques for Network and Data Protection

7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings
Buch | Softcover
VIII, 268 Seiten
2003 | 2003
Springer Berlin (Verlag)
978-3-540-20185-4 (ISBN)
CHF 74,85 inkl. MwSt
The Communications and Multimedia Security conference (CMS 2003) was - ganized in Torino, Italy, on October 2-3, 2003. CMS 2003 was the seventh IFIP working conference on communications and multimedia security since 1995. - search issues and practical experiences were the topics of interest, with a special focus on the security of advanced technologies, such as wireless and multimedia communications. The book Advanced Communications and Multimedia Security contains the 21 articles that were selected by the conference program committee for p- sentation at CMS 2003. The articles address new ideas and experimental eval- tion in several ?elds related to communications and multimedia security, such as cryptography, network security, multimedia data protection, application se- rity, trust management and user privacy. We think that they will be of interest not only to the conference attendees but also to the general public of researchers in the security ?eld. We wish to thank all the participants, organizers, and contributors of the CMS 2003 conference for having made it a success. October 2003 Antonio Lioy GeneralChairofCMS2003 Daniele Mazzocchi ProgramChairofCMS2003 VI Organization CMS 2003 was organized by the TORSEC Computer and Network Security Group of the Dipartimento di Automatica ed Informatica at the Politecnico di Torino, in cooperation with the Istituto Superiore Mario Boella.

Cryptography.- Computation of Cryptographic Keys from Face Biometrics.- AUTHMAC_DH: A New Protocol for Authentication and Key Distribution.- Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection.- Network Security.- Securing the Border Gateway Protocol: A Status Update.- Towards an IPv6-Based Security Framework for Distributed Storage Resources.- Operational Characteristics of an Automated Intrusion Response System.- Mobile and Wireless Network Security.- A Secure Multimedia System in Emerging Wireless Home Networks.- Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents.- A Security Scheme for Mobile Agent Platforms in Large-Scale Systems.- Trust and Privacy.- Privacy and Trust in Distributed Networks.- Extending the SDSI / SPKI Model through Federation Webs.- Trust- : An XML Framework for Trust Negotiations.- Application Security.- How to Specify Security Services: A Practical Approach.- Application Level Smart Card Support through Networked Mobile Devices.- Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage.- Multimedia Security.- Selective Encryption of the JPEG2000 Bitstream.- Robust Spatial Data Hiding for Color Images.- Watermark Security via Secret Wavelet Packet Subband Structures.- A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression.- Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs.- Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization.

Erscheint lt. Verlag 24.9.2003
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo VIII, 268 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 233 mm
Gewicht 399 g
Themenwelt Mathematik / Informatik Informatik Netzwerke
Informatik Theorie / Studium Kryptologie
Schlagworte Communication • Communication Protocols • Communications Security • cryptography • data hiding • digital cash • Hardcover, Softcover / Informatik, EDV/Datenkommunikation, Netzwerke • HC/Informatik, EDV/Datenkommunikation, Netzwerke • mobile code security • Multimedia • multimedia data protection • multimedia security • Network Security • privacy • security • Trust • trust management • Watermarking • wireless networks
ISBN-10 3-540-20185-8 / 3540201858
ISBN-13 978-3-540-20185-4 / 9783540201854
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich