This book constitutes the refereed proceedings of the 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, CMS 2005, held in Salzburg, Austria in September 2005.
The 28 revised full papers and 13 two-page abstracts presented together with 4 invited papers were carefully reviewed and selected from 143 submissions. The papers are organized in topical sections on applied cryptography, DRM and e-commerce, media encryption, multimedia security, privacy, biometrics and access control, network security, mobile security, and XML security.
Author(s): L’ubica Staneková, Martin Stanek (auth.), Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.)
Series: Lecture Notes in Computer Science 3677 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005
Language: English
Pages: 360
Tags: Computer Communication Networks; Data Encryption; Multimedia Information Systems; Information Systems Applications (incl.Internet); Management of Computing and Information Systems; Computers and Society
Front Matter....Pages -
Fast Contract Signing with Batch Oblivious Transfer....Pages 1-10
An Instruction Set Extension for Fast and Memory-Efficient AES Implementation....Pages 11-21
Self-healing Key Distribution Schemes with Sponsorization....Pages 22-31
Effective Protection Against Phishing and Web Spoofing....Pages 32-41
Identity Based DRM: Personal Entertainment Domain....Pages 42-54
Rights and Trust in Multimedia Information Management....Pages 55-64
Signature Amortization Using Multiple Connected Chains....Pages 65-76
A Key Embedded Video Codec for Secure Video Multicast....Pages 77-87
Puzzle – A Novel Video Encryption Algorithm....Pages 88-97
Selective Image Encryption Using JBIG....Pages 98-107
On Reversibility of Random Binning Techniques: Multimedia Perspectives....Pages 108-118
A Graph–Theoretic Approach to Steganography....Pages 119-128
Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme....Pages 129-139
Video Surveillance: A Distributed Approach to Protect Privacy....Pages 140-149
Privacy-Preserving Electronic Health Records....Pages 150-159
Using XACML for Privacy Control in SAML-Based Identity Federations....Pages 160-169
Verifier-Tuple as a Classifier for Biometric Handwriting Authentication – Combination of Syntax and Semantics....Pages 170-179
Decentralised Access Control in 802.11 Networks....Pages 180-190
Multimodal Biometrics for Voice and Handwriting....Pages 191-199
Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks....Pages 200-209
Polymorphic Code Detection with GA Optimized Markov Models....Pages 210-219
A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks....Pages 220-229
Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets....Pages 230-239
Assessment of Palm OS Susceptibility to Malicious Code Threats....Pages 240-249
Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication....Pages 250-260
Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting....Pages 261-263
INVUS: INtelligent VUlnerability Scanner....Pages 264-265
Personal Rights Management– Enabling Privacy Rights in Digital Online Content....Pages 266-268
Flexible Traitor Tracing for Anonymous Attacks....Pages 269-270
Efficient Key Distribution for Closed Meetings in the Internet....Pages 271-272
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics....Pages 273-274
Applying LR Cube Analysis to JSteg Detection....Pages 275-276
Digital Signatures Based on Invertible Watermarks for Video Authentication....Pages 277-279
A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents....Pages 280-281
Semantically Extended Digital Watermarking Model for Multimedia Content....Pages 282-283
An Architecture for Secure Policy Enforcement in E-Government Services Deployment....Pages 284-285
Some Critical Aspects of the PKIX TSP....Pages 286-288
Motivations for a Theoretical Approach to WYSIWYS....Pages 289-290
Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications....Pages 291-300
Integrating XML Linked Time-Stamps in OASIS Digital Signature Services....Pages 301-310
Trustworthy Verification and Visualisation of Multiple XML-Signatures....Pages 311-320
Experience XML Security....Pages 321-329
How to Make a Federation Manageable....Pages 330-338
XML Signatures in an Enterprise Service Bus Environment....Pages 339-347
Using the XML Key Management Specification (and Breaking X.509 Rules as You Go)....Pages 348-357
Back Matter....Pages -