This book constitutes the refereed proceedings of the 7th IFIP International Conference on Communications and Multimedia Security, CMS 2003, held in Torino, Italy in October 2003.
The 21 revised full papers presented were carefully reviewed and selected for presentation. The papers are organized in topical sections on cryptography, network security, mobile and wireless network security, trust and privacy, application security, and multimedia security.
Author(s): Alwyn Goh, David C. L. Ngo (auth.), Antonio Lioy, Daniele Mazzocchi (eds.)
Series: Lecture Notes in Computer Science 2828
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003
Language: English
Pages: 268
Tags: Computer Communication Networks; Operating Systems; Data Encryption; Multimedia Information Systems; Computers and Society; Management of Computing and Information Systems
Front Matter....Pages -
Computation of Cryptographic Keys from Face Biometrics....Pages 1-13
AUTHMAC_DH: A New Protocol for Authentication and Key Distribution....Pages 14-26
Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection....Pages 27-39
Securing the Border Gateway Protocol: A Status Update....Pages 40-53
Towards an IPv6-Based Security Framework for Distributed Storage Resources....Pages 54-64
Operational Characteristics of an Automated Intrusion Response System....Pages 65-75
A Secure Multimedia System in Emerging Wireless Home Networks....Pages 76-88
Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents....Pages 89-103
A Security Scheme for Mobile Agent Platforms in Large-Scale Systems....Pages 104-116
Privacy and Trust in Distributed Networks....Pages 117-131
Extending the SDSI / SPKI Model through Federation Webs....Pages 132-145
Trust- $\mathcal{X}$ : An XML Framework for Trust Negotiations....Pages 146-157
How to Specify Security Services: A Practical Approach....Pages 158-171
Application Level Smart Card Support through Networked Mobile Devices....Pages 172-180
Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage....Pages 181-193
Selective Encryption of the JPEG2000 Bitstream....Pages 194-204
Robust Spatial Data Hiding for Color Images....Pages 205-213
Watermark Security via Secret Wavelet Packet Subband Structures....Pages 214-225
A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression....Pages 226-238
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs....Pages 239-251
Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization....Pages 252-263
Back Matter....Pages -