Duringthelastfewyearsweseenetworkandinformationsystemsecurityplaying an increasingly important role in our everyday lives. As our computers continue to get infested by all sorts of malware, and as our networks continue to choke with spam and malicious tra?c, we see more and more people losing their co- dence in information technologies as they get signi?cantly concernedabout their security as well as their privacy and that of their loved ones. In their e?ort to cope with the problem, scientists, managers, and politicians all over the world havedesignedandarecurrently implementing systematicapproachesto network and information security, most of which are underlined by the same principle: there is much more room for improvement and research. Along the lines of encouraging and catalyzing research in the area of c- munications and multimedia security, it is our great pleasure to present the proceedings of the 10th IFIP TC-6 TC-11 Conference on Communications and MultimediaSecurity(CMS2006),whichwasheldinHeraklion,CreteonOctober 19-21, 2006. Continuing the tradition of previous CMS conferences, we sought a balanced program containing presentations on various aspects of secure c- munication and multimedia systems. Special emphasis was laid on papers with direct practical relevance for the construction of secure communication systems. The selection of the program was a challenging task. In total, we received 76 submissions, from which 22 were selected for presentation as full papers.
Author(s): Huafei Zhu, Feng Bao, Jianwei Liu (auth.), Herbert Leitold, Evangelos P. Markatos (eds.)
Series: Lecture Notes in Computer Science 4237 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006
Language: English
Pages: 260
Tags: Computer Communication Networks; Data Encryption; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems; Information Systems Applications (incl.Internet); Communications Engineering, Networks
Front Matter....Pages -
Computing of Trust in Ad-Hoc Networks....Pages 1-11
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation....Pages 12-21
On the Privacy Risks of Publishing Anonymized IP Network Traces....Pages 22-32
Secure Mobile Notifications of Civilians in Case of a Disaster....Pages 33-42
A Fair Anonymous Submission and Review System....Pages 43-53
Attribute Delegation Based on Ontologies and Context Information....Pages 54-66
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains....Pages 67-86
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange....Pages 87-96
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart....Pages 97-108
Perturbing and Protecting a Traceable Block Cipher....Pages 109-119
A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors....Pages 120-129
Timed Release Cryptography from Bilinear Pairings Using Hash Chains....Pages 130-140
Compression of Encrypted Visual Data....Pages 141-150
Selective Encryption for Hierarchical MPEG....Pages 151-160
Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods....Pages 161-172
A Flexible and Open DRM Framework....Pages 173-184
PPINA – A Forensic Investigation Protocol for Privacy Enhancing Technologies....Pages 185-195
A Privacy Agent in Context-Aware Ubiquitous Computing Environments....Pages 196-205
Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems....Pages 206-215
Attack Graph Based Evaluation of Network Security....Pages 216-227
Information Modeling for Automated Risk Analysis....Pages 228-239
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication....Pages 240-251
Back Matter....Pages -