default search action
6th Communications and Multimedia Security 2002: Portoroz, Slovenia
- Borka Jerman-Blazic, Tomaz Klobucar:
Advanced Communications and Multimedia Security, IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia. IFIP Conference Proceedings 228, Kluwer 2002, ISBN 978-1-4020-7206-2
Applied Cryptography
- Chris J. Mitchell, Namhyun Hur:
On the security of a structural proven signer ordering multisignature scheme. 1-8 - Sattam S. Al-Riyami, Chris J. Mitchell:
Renewing crytographic timestamps. 9-16 - Wolfgang Bauer:
Implementing elliptic curve cryptography. 17-28 - Yan Wang, Shuwang Lü, Zhenhua Liu:
A new asymmetric fingerprinting framework based on secret sharing. 29-40 - Mohamed Al-Ibrahim, Josef Pieprzyk:
Authentication of transit flows and k-siblings one-time signature. 41-55
Communications Security
- Andre Zuquete:
Improving the functionality of syn cookies. 57-77 - Tadauchi Masaharu, Ishii Tatsuei, Itoh Susumu:
A mac-layer security architecture for cable networks. 79-90 - Edgar R. Weippl, Wolfgang Eßmayr, F. Gruber, W. Stockner, T. Trenker:
Towards authentication using mobile devices. 91-105 - Pietro Michiardi, Refik Molva:
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. 107-121 - Yves Roudier, Olivier Fouache, Pierre Vannel, Refik Molva:
Enabling adaptive and secure extranets. 123-135 - Alain Pannetrat, Refik Molva:
Multiple layer encryption for multicast groups. 137-153
Distributed Systems Security
- Bogdan C. Popescu, Chandana Gamage, Andrew S. Tanenbaum:
Access control, reverse access control and replication control in a world wide distributed system. 155-167 - Dimitris Raptis, Theodosis Dimitrakos, Bjørn Axel Gran, Ketil Stølen:
The coras approach for model-based risk management applied to e-commerce domain. 169-181 - Dusan Gabrijelcic, Arso Savanovic, Borka Jerman-Blazic:
Towards security architecture for future active IP networks. 183-195
Multimedia Security
- Martin Steinebach, Jana Dittmann, Eva Saar:
Combined fingerprinting attacks against digital audio watermarking: methods, results and solutions. 197-212 - Champskud J. Skrepth, Andreas Uhl:
Selective encryption of visual data. 213-226 - Václav Matyás Jr., Zdenek Ríha:
Biometric authentication - security and usability. 227-239
Applications Security
- Arno Hollosi, Udo Payer, Reinhard Posch:
Automatic authentication based on the Austrian citizen card. 241-253 - Arno Hollosi, Herbert Leitold, Reinhard Posch:
An open interface enabling secure e-government. 255-266 - Gasper Lavrencic, Borka Jerman-Blazic, Aleksej Jerman Blazic:
Cadenus security considerations. 267-278
Digital Signatures
- Karl Scheibelhofer:
Validation of long-term signatures. 279-292 - K. Kain, Sean W. Smith, R. Asokan:
Digital signatures and electronic documents: a cautionary tale. 293-308
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.