Communications and Multimedia Security
Springer Berlin (Verlag)
978-3-540-47820-1 (ISBN)
Computing of Trust in Ad-Hoc Networks.- TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation.- On the Privacy Risks of Publishing Anonymized IP Network Traces.- Secure Mobile Notifications of Civilians in Case of a Disaster.- A Fair Anonymous Submission and Review System.- Attribute Delegation Based on Ontologies and Context Information.- Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains.- One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange.- Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart.- Perturbing and Protecting a Traceable Block Cipher.- A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors.- Timed Release Cryptography from Bilinear Pairings Using Hash Chains.- Compression of Encrypted Visual Data.- Selective Encryption for Hierarchical MPEG.- Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods.- A Flexible and Open DRM Framework.- PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies.- A Privacy Agent in Context-Aware Ubiquitous Computing Environments.- Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems.- Attack Graph Based Evaluation of Network Security.- Information Modeling for Automated Risk Analysis.- Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.
Erscheint lt. Verlag | 11.10.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 260 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 386 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Access Control • aes • Algorithm analysis and problem complexity • authentication • Communication • cryptography • Data Security • Digital rights management • DRM • image encryption • Information • Mobile Agents • Modeling • Multimedia • multimedia security • Network Security • Pricacy • Secure Communications • secure video broadcasting • Steganography • video encryption • XML • xml security |
ISBN-10 | 3-540-47820-5 / 3540478205 |
ISBN-13 | 978-3-540-47820-1 / 9783540478201 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich