


default search action
8th Communications and Multimedia Security 2004: Windermere, The Lake District, UK
- David Chadwick, Bart Preneel:

Communications and Multimedia Security - 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom. IFIP 175, Springer 2005, ISBN 978-0-387-24485-3 - Jan Iwanik, Marek Klonowski, Miroslaw Kutylowski:

Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion Protocols. 1-15 - Howard Chivers:

Personal Attributes and Privacy - How to ensure that private attribute management is not subverted by datamining. 17-29 - Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli:

Local Management of Credits and Debits in Mobile Ad Hoc Networks. 31-45 - Tobias Murmann, Heiko Rossnagel

:
How Secure are Current Mobile Operating Systems? 47-58 - Mousa Alfalayleh, Ljiljana Brankovic

:
An Overview of Security Issues and Techniques in Mobile Agents. 59-78 - Konstantinos Markantonakis, Keith Mayes:

A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography. 79-95 - Timothy W. van der Horst, Tore Sundelin, Kent E. Seamons

, Charles D. Knutson:
Mobile Trust Negotiation - Authentication and Authorization in Dynamic Mobile Networks. 97-109 - Vesa Torvinen, Jukka Ylitalo:

Weak Context Establishment Procedure for Mobility and Multi-Homing Management. 111-123 - Lieven Desmet, Bart Jacobs, Frank Piessens, Wouter Joosen:

A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components. 125-130 - Lieven Desmet, Bart Jacobs, Frank Piessens, Wouter Joosen:

Threat Modelling for Web Services Based Web Applications. 131-144 - Rüidiger Grimm, Henrik Eichstädt:

Threat Modelling for ASP.NET - Designing Secure Applications. 145-158 - Elisa Bertino, Danilo Bruschi, Stefano Franzoni, Igor Nai Fovino, Stefano Valtolina:

Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application. 159-171 - David W. Chadwick:

Threat Modelling for Active Directory. 173-182 - Danny De Cock, Karel Wouters, Dries Schellekens, Dave Singelée, Bart Preneel:

Threat Modelling for Security Tokens in Web Applications. 183-193 - Ralf-Philipp Weinmann, Kai Wirt:

Analysis of the DVB Common Scrambling Algorithm. 195-207 - Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas:

An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder. 209-221 - Roland Norcen, Andreas Uhl:

Robust Visual Hashing Using JPEG 2000. 223-235 - Takashi Suzuki, Zulfikar Ramzan, Hiroshi Fujimoto, Craig Gentry, Takehiro Nakayama, Ravi Jain:

A System for End-to-End Authentication of Adaptive Multimedia Content. 237-249 - David W. Chadwick, Sassa Otenko, Von Welch:

Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure. 251-261 - David W. Chadwick, Graeme Lunt, Gansen Zhao:

Secure Role Based Messaging. 263-275 - Elmarie Kritzinger

, Sebastiaan H. von Solms:
Five Non-Technical Pillars of Network Information Security Management. 277-287

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














