Communications and Multimedia Security: 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 – 21, 2005. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, CMS 2005, held in Salzburg, Austria in September 2005.

The 28 revised full papers and 13 two-page abstracts presented together with 4 invited papers were carefully reviewed and selected from 143 submissions. The papers are organized in topical sections on applied cryptography, DRM and e-commerce, media encryption, multimedia security, privacy, biometrics and access control, network security, mobile security, and XML security.

Author(s): L’ubica Staneková, Martin Stanek (auth.), Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.)
Series: Lecture Notes in Computer Science 3677 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005

Language: English
Pages: 360
Tags: Computer Communication Networks; Data Encryption; Multimedia Information Systems; Information Systems Applications (incl.Internet); Management of Computing and Information Systems; Computers and Society

Front Matter....Pages -
Fast Contract Signing with Batch Oblivious Transfer....Pages 1-10
An Instruction Set Extension for Fast and Memory-Efficient AES Implementation....Pages 11-21
Self-healing Key Distribution Schemes with Sponsorization....Pages 22-31
Effective Protection Against Phishing and Web Spoofing....Pages 32-41
Identity Based DRM: Personal Entertainment Domain....Pages 42-54
Rights and Trust in Multimedia Information Management....Pages 55-64
Signature Amortization Using Multiple Connected Chains....Pages 65-76
A Key Embedded Video Codec for Secure Video Multicast....Pages 77-87
Puzzle – A Novel Video Encryption Algorithm....Pages 88-97
Selective Image Encryption Using JBIG....Pages 98-107
On Reversibility of Random Binning Techniques: Multimedia Perspectives....Pages 108-118
A Graph–Theoretic Approach to Steganography....Pages 119-128
Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme....Pages 129-139
Video Surveillance: A Distributed Approach to Protect Privacy....Pages 140-149
Privacy-Preserving Electronic Health Records....Pages 150-159
Using XACML for Privacy Control in SAML-Based Identity Federations....Pages 160-169
Verifier-Tuple as a Classifier for Biometric Handwriting Authentication – Combination of Syntax and Semantics....Pages 170-179
Decentralised Access Control in 802.11 Networks....Pages 180-190
Multimodal Biometrics for Voice and Handwriting....Pages 191-199
Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks....Pages 200-209
Polymorphic Code Detection with GA Optimized Markov Models....Pages 210-219
A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks....Pages 220-229
Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets....Pages 230-239
Assessment of Palm OS Susceptibility to Malicious Code Threats....Pages 240-249
Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication....Pages 250-260
Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting....Pages 261-263
INVUS: INtelligent VUlnerability Scanner....Pages 264-265
Personal Rights Management– Enabling Privacy Rights in Digital Online Content....Pages 266-268
Flexible Traitor Tracing for Anonymous Attacks....Pages 269-270
Efficient Key Distribution for Closed Meetings in the Internet....Pages 271-272
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics....Pages 273-274
Applying LR Cube Analysis to JSteg Detection....Pages 275-276
Digital Signatures Based on Invertible Watermarks for Video Authentication....Pages 277-279
A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents....Pages 280-281
Semantically Extended Digital Watermarking Model for Multimedia Content....Pages 282-283
An Architecture for Secure Policy Enforcement in E-Government Services Deployment....Pages 284-285
Some Critical Aspects of the PKIX TSP....Pages 286-288
Motivations for a Theoretical Approach to WYSIWYS....Pages 289-290
Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications....Pages 291-300
Integrating XML Linked Time-Stamps in OASIS Digital Signature Services....Pages 301-310
Trustworthy Verification and Visualisation of Multiple XML-Signatures....Pages 311-320
Experience XML Security....Pages 321-329
How to Make a Federation Manageable....Pages 330-338
XML Signatures in an Enterprise Service Bus Environment....Pages 339-347
Using the XML Key Management Specification (and Breaking X.509 Rules as You Go)....Pages 348-357
Back Matter....Pages -