


default search action
7th Communications and Multimedia Security 2003: Torino, Italy
- Antonio Lioy, Daniele Mazzocchi:

Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings. Lecture Notes in Computer Science 2828, Springer 2003, ISBN 3-540-20185-8
Cryptography
- Alwyn Goh, David Ngo Chek Ling:

Computation of Cryptographic Keys from Face Biometrics. 1-13 - Heba Kamal Aslan:

AUTHMAC_DH: A New Protocol for Authentication and Key Distribution. 14-26 - Alwyn Goh, David Ngo Chek Ling:

Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection. 27-39
Network Security
- Stephen T. Kent:

Securing the Border Gateway Protocol: A Status Update. 40-53 - Alessandro Bassi

, Julien Laganier:
Towards an IPv6-Based Security Framework for Distributed Storage Resources. 54-64 - Maria Papadaki

, Steven Furnell, Benn Lines, Paul L. Reynolds:
Operational Characteristics of an Automated Intrusion Response System. 65-75
Mobile and Wireless Network Security
- Nut Taesombut, Richard Y. Huang, P. Venkat Rangan:

A Secure Multimedia System in Emerging Wireless Home Networks. 76-88 - Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji

:
Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents. 89-103 - Michelle S. Wangham

, Joni da Silva Fraga, Rafael R. Obelheiro:
A Security Scheme for Mobile Agent Platforms in Large-Scale Systems. 104-116
Trust and Privacy
- Thomas Rössler, Arno Hollosi:

Privacy and Trust in Distributed Networks. 117-131 - Altair Olivo Santin, Joni da Silva Fraga, Carlos Maziero:

Extending the SDSI / SPKI Model through Federation Webs. 132-145 - Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini:

Trust-Chi: An XML Framework for Trust Negotiations. 146-157
Application Security
- Javier López, Juan J. Ortega, José Luis Vivas, José M. Troya:

How to Specify Security Services: A Practical Approach. 158-171 - Pierpaolo Baglietto, Francesco Moggia, Nicola Zingirian, Massimo Maresca:

Application Level Smart Card Support through Networked Mobile Devices. 172-180 - Alwyn Goh, Wai Kuan Yip, David Ngo Chek Ling:

Flexibly Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage. 181-193
Multimedia Security
- Roland Norcen, Andreas Uhl:

Selective Encryption of the JPEG2000 Bitstream. 194-204 - Xiaoqiang Li, Xiangyang Xue, Wei Li:

Robust Spatial Data Hiding for Color Images. 205-213 - Werner Dietl, Andreas Uhl:

Watermark Security via Secret Wavelet Packet Subband Structures. 214-225 - David Megías, Jordi Herrera-Joancomartí

, Julià Minguillón:
A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression. 226-238 - Alwyn Goh, Geong Sen Poh, David Ngo Chek Ling:

Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs. 239-251 - Bubi G. Flepp-Stars, Herbert Stögner, Andreas Uhl:

Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization. 252-263

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














