000 05471nam a22006615i 4500
001 978-3-540-47823-2
003 DE-He213
005 20240730181936.0
007 cr nn 008mamaa
008 100924s2006 gw | s |||| 0|eng d
020 _a9783540478232
_9978-3-540-47823-2
024 7 _a10.1007/11909033
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aCommunications and Multimedia Security
_h[electronic resource] :
_b10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings /
_cedited by Herbert Leitold, Evangelos Markatos.
250 _a1st ed. 2006.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2006.
300 _aXII, 260 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v4237
505 0 _aComputing of Trust in Ad-Hoc Networks -- TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation -- On the Privacy Risks of Publishing Anonymized IP Network Traces -- Secure Mobile Notifications of Civilians in Case of a Disaster -- A Fair Anonymous Submission and Review System -- Attribute Delegation Based on Ontologies and Context Information -- Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains -- One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange -- Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart -- Perturbing and Protecting a Traceable Block Cipher -- A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors -- Timed Release Cryptography from Bilinear Pairings Using Hash Chains -- Compression of Encrypted Visual Data -- Selective Encryption for Hierarchical MPEG -- Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods -- A Flexible and Open DRM Framework -- PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies -- A Privacy Agent in Context-Aware Ubiquitous Computing Environments -- Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems -- Attack Graph Based Evaluation of Network Security -- Information Modeling for Automated Risk Analysis -- Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.
520 _aDuringthelastfewyearsweseenetworkandinformationsystemsecurityplaying an increasingly important role in our everyday lives. As our computers continue to get infested by all sorts of malware, and as our networks continue to choke with spam and malicious tra?c, we see more and more people losing their co- dence in information technologies as they get signi?cantly concernedabout their security as well as their privacy and that of their loved ones. In their e?ort to cope with the problem, scientists, managers, and politicians all over the world havedesignedandarecurrently implementing systematicapproachesto network and information security, most of which are underlined by the same principle: there is much more room for improvement and research. Along the lines of encouraging and catalyzing research in the area of c- munications and multimedia security, it is our great pleasure to present the proceedings of the 10th IFIP TC-6 TC-11 Conference on Communications and MultimediaSecurity(CMS2006),whichwasheldinHeraklion,CreteonOctober 19-21, 2006. Continuing the tradition of previous CMS conferences, we sought a balanced program containing presentations on various aspects of secure c- munication and multimedia systems. Special emphasis was laid on papers with direct practical relevance for the construction of secure communication systems. The selection of the program was a challenging task. In total, we received 76 submissions, from which 22 were selected for presentation as full papers.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer networks .
_931572
650 0 _aAlgorithms.
_93390
650 0 _aElectronic data processing
_xManagement.
_9126665
650 0 _aApplication software.
_9126666
650 0 _aTelecommunication.
_910437
650 1 4 _aCryptology.
_931769
650 2 4 _aComputer Communication Networks.
_9126667
650 2 4 _aAlgorithms.
_93390
650 2 4 _aIT Operations.
_931703
650 2 4 _aComputer and Information Systems Applications.
_9126668
650 2 4 _aCommunications Engineering, Networks.
_931570
700 1 _aLeitold, Herbert.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9126669
700 1 _aMarkatos, Evangelos.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9126670
710 2 _aSpringerLink (Online service)
_9126671
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540478201
776 0 8 _iPrinted edition:
_z9783540832096
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v4237
_9126672
856 4 0 _uhttps://doi.org/10.1007/11909033
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c91147
_d91147