Communications and Multimedia Security Issues of the New Century -

Communications and Multimedia Security Issues of the New Century

IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany
Buch | Hardcover
432 Seiten
2001
Springer (Verlag)
978-0-7923-7365-0 (ISBN)
234,33 inkl. MwSt
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) "IT Sicherheit" conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, the CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The CMS 1999 was held in Leuven, Belgium. This conference provides a forum for presentations and discussions on issues which combine innovative research work with a highly promising application potential in the area of security for communication and multimedia security. State-of-the-art issues as well as practical experiences and new trends in the areas were topics of interest again, as it has already been the case at previous conferences. This year, the organizers wanted to focus the attention on watermarking and copyright protection for e­ commerce applications and multimedia data. We also encompass excellent work on recent advances in cryptography and their applications. In recent years, digital media data have enormously gained in importance.

Web Security.- What You See Is What You Sign —Trustworthy Display of XML Documents for Signing and Verification.- XML Electronic Signatures.- An integrated secure Web architecture for protected Mobile code distribution.- Secure and anonymous multicast framework.- Vulnerabilities and Security Limitations of current IP Telephony Systems.- Watermarking I.- Quantization Watermarking in the JPEG2000 Coding Pipeline.- Theoretic Performance Analysis of a Watermarking System based on Bernoulli Chaotic Sequences.- Scalable Detection of Perceptual Watermarks in JPEG2000 Images.- Cryptographic Algorithms.- Collecting randomness from the net.- Encryption System Based on Neutral Network.- A Modified Chaotic Cryptographic Method.- An Elliptic Curve Random Number Generator.- Watermarking II.- Conditional and User Specific Access to Services and Resources Using Annotation Watermarks.- Large Scale distributed watermarking of multicast media through encryption.- Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept.- Fingerprints for Copyright Protection.- System Security.- Software Security Assessment through Specification Mutations and Fault Injection.- Asynchronous Large-Scale Certification Based on Certificate Verification Trees.- ACLA: A Framework for Access Control List (ACL) Analysis and Optimization.- Transparent Access To Encrypted Data Using Operating System Network Stack Extensions.- A PC Cryptographic Coprocessor Based on TI Signal Processor And Smart Card System.- Watermarking III.- Optimization of Watermarking Performances Using Error Correcting Codes and Repetition.- Using Raw Speech as a Watermark, does it work?.- Multiple Security Aspects.- Transferability in Coin Systems with Observers.- Secure iLearning.- Tree-based Multicast KeyAgreement.- Security for the core network of third generation mobile systems.- Secure Internet Phone.- Posters.- Secure Meeting Scheduling with AgenTa.- Virtual Hidden Network.- Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval.- A Prepositioned Secret Sharing Scheme for Message Authentication in Broadcast Networks.- Secure Service Centered Networking for Nomadic Usage.- Last Minute Papers.- A Secure Authentication Infrastructure for Mobile Communication Services over the Internet.- Blind Compressed-Domain Watermarking for MPEG-encoded Videos.- Index of Contributors.

Erscheint lt. Verlag 31.5.2001
Reihe/Serie IFIP International Federation for Information Processing ; 64
Zusatzinfo XVI, 432 p.
Verlagsort Dordrecht
Sprache englisch
Maße 156 x 234 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-7923-7365-0 / 0792373650
ISBN-13 978-0-7923-7365-0 / 9780792373650
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00