Communications and Multimedia Security Issues of the New Century
Springer-Verlag New York Inc.
978-1-4757-4811-6 (ISBN)
Web Security.- What You See Is What You Sign —Trustworthy Display of XML Documents for Signing and Verification.- XML Electronic Signatures.- An integrated secure Web architecture for protected Mobile code distribution.- Secure and anonymous multicast framework.- Vulnerabilities and Security Limitations of current IP Telephony Systems.- Watermarking I.- Quantization Watermarking in the JPEG2000 Coding Pipeline.- Theoretic Performance Analysis of a Watermarking System based on Bernoulli Chaotic Sequences.- Scalable Detection of Perceptual Watermarks in JPEG2000 Images.- Cryptographic Algorithms.- Collecting randomness from the net.- Encryption System Based on Neutral Network.- A Modified Chaotic Cryptographic Method.- An Elliptic Curve Random Number Generator.- Watermarking II.- Conditional and User Specific Access to Services and Resources Using Annotation Watermarks.- Large Scale distributed watermarking of multicast media through encryption.- Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept.- Fingerprints for Copyright Protection.- System Security.- Software Security Assessment through Specification Mutations and Fault Injection.- Asynchronous Large-Scale Certification Based on Certificate Verification Trees.- ACLA: A Framework for Access Control List (ACL) Analysis and Optimization.- Transparent Access To Encrypted Data Using Operating System Network Stack Extensions.- A PC Cryptographic Coprocessor Based on TI Signal Processor And Smart Card System.- Watermarking III.- Optimization of Watermarking Performances Using Error Correcting Codes and Repetition.- Using Raw Speech as a Watermark, does it work?.- Multiple Security Aspects.- Transferability in Coin Systems with Observers.- Secure iLearning.- Tree-based Multicast KeyAgreement.- Security for the core network of third generation mobile systems.- Secure Internet Phone.- Posters.- Secure Meeting Scheduling with AgenTa.- Virtual Hidden Network.- Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval.- A Prepositioned Secret Sharing Scheme for Message Authentication in Broadcast Networks.- Secure Service Centered Networking for Nomadic Usage.- Last Minute Papers.- A Secure Authentication Infrastructure for Mobile Communication Services over the Internet.- Blind Compressed-Domain Watermarking for MPEG-encoded Videos.- Index of Contributors.
Erscheint lt. Verlag | 22.1.2013 |
---|---|
Reihe/Serie | IFIP International Federation for Information Processing ; 64 |
Zusatzinfo | XVI, 432 p. |
Verlagsort | New York, NY |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Mathematik / Informatik ► Informatik ► Grafik / Design |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Kryptologie | |
Medizin / Pharmazie | |
Wirtschaft ► Betriebswirtschaft / Management | |
ISBN-10 | 1-4757-4811-6 / 1475748116 |
ISBN-13 | 978-1-4757-4811-6 / 9781475748116 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich