default search action
10th Communications and Multimedia Security 2006: Heraklion, Crete, Greece
- Herbert Leitold, Evangelos P. Markatos:
Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings. Lecture Notes in Computer Science 4237, Springer 2006, ISBN 3-540-47820-5
Advances in Network and Information Security
- Huafei Zhu, Feng Bao, Jianwei Liu:
Computing of Trust in Ad-Hoc Networks. 1-11 - Spyros Antonatos, Kostas G. Anagnostakis:
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation. 12-21 - Dimitris Koukis, Spyros Antonatos, Kostas G. Anagnostakis:
On the Privacy Risks of Publishing Anonymized IP Network Traces. 22-32 - Heiko Rossnagel, Tobias Scherner:
Secure Mobile Notifications of Civilians in Case of a Disaster. 33-42 - Vincent Naessens, Liesje Demuynck, Bart De Decker:
A Fair Anonymous Submission and Review System. 43-53 - Isaac Agudo, Javier López, José A. Montenegro:
Attribute Delegation Based on Ontologies and Context Information. 54-66 - David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen:
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. 67-86 - Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee:
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. 87-96 - Elias Athanasopoulos, Spyros Antonatos:
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart. 97-108 - Julien Bringer, Hervé Chabanne, Emmanuelle Dottax:
Perturbing and Protecting a Traceable Block Cipher. 109-119 - Jörg Platte, Raúl Durán Díaz, Edwin Naroska:
A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors. 120-129 - Konstantinos Chalkias, George Stephanides:
Timed Release Cryptography from Bilinear Pairings Using Hash Chains. 130-140 - Michael Gschwandtner, Andreas Uhl, Peter Wild:
Compression of Encrypted Visual Data. 141-150 - Heinz Hofbauer, Thomas Stütz, Andreas Uhl:
Selective Encryption for Hierarchical MPEG. 151-160 - Xiangyang Luo, Chunfang Yang, Fenlin Liu:
Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods. 161-172 - Kristof Verslype, Bart De Decker:
A Flexible and Open DRM Framework. 173-184 - Giannakis Antoniou, Campbell Wilson, Dimitris Geneiatakis:
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies. 185-195 - Ni (Jenny) Zhang, Chris Todd:
A Privacy Agent in Context-Aware Ubiquitous Computing Environments. 196-205 - Seng-Phil Hong, Sungmin Kang:
Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems. 206-215 - Igor V. Kotenko, Mikhail Stepashkin:
Attack Graph Based Evaluation of Network Security. 216-227 - Howard Chivers:
Information Modeling for Automated Risk Analysis. 228-239 - Andriy Panchenko, Lexi Pimenidis:
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication. 240-251
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.