


default search action
12th Communications and Multimedia Security 2011: Ghent, Belgium
- Bart De Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl:

Communications and Multimedia Security, 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings. Lecture Notes in Computer Science 7025, Springer 2011, ISBN 978-3-642-24711-8
Research Papers
- Jorn Lapon

, Markulf Kohlweiss
, Bart De Decker, Vincent Naessens:
Analysis of Revocation Strategies for Anonymous Idemix Credentials. 3-17 - Mahdi R. Alaghband, Mohammad Reza Aref:

A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks. 18-31 - Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider

:
Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version). 32-44 - Kurt Dietrich, Johannes Winter, Granit Luzhnica, Siegfried Podesser:

Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms. 45-58 - Ronny Merkel, Jana Dittmann, Claus Vielhauer:

Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature. 59-71 - Reinhard Huber, Herbert Stögner, Andreas Uhl:

Two-Factor Biometric Recognition with Integrated Tamper-Protection Watermarking. 72-84 - Karl Kümmel, Tobias Scheidat, Christian Arndt, Claus Vielhauer:

Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting. 85-93 - Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:

Dynamic Software Birthmark for Java Based on Heap Memory Analysis. 94-107 - Li Weng, Bart Preneel

:
A Secure Perceptual Hash Algorithm for Image Content Authentication. 108-121 - Steffen Wendzel

, Jörg Keller:
Low-Attention Forwarding for Mobile Network Covert Channels. 122-133 - Fuwen Liu, Hartmut König:

Cryptanalysis of a SIP Authentication Scheme. 134-143
Work in Progress
- Lisa Rajbhandari, Einar Snekkenes:

Mapping between Classical Risk Management and Game Theoretical Approaches. 147-154 - Konstantinos Rantos

:
Digital Signatures: How Close Is Europe to Truly Interoperable Solutions? 155-162 - Koen Decroix, Milica Milutinovic, Bart De Decker, Vincent Naessens:

A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning. 163-170 - Geoffrey Ottoy, Jeroen Martens, Nick Saeys, Bart Preneel

, Lieven De Strycker
, Jean-Pierre Goemaere, Tom Hamelinckx:
A Modular Test Platform for Evaluation of Security Protocols in NFC Applications. 171-177 - Georg Schönberger, Jürgen Fuß

:
GPU-Assisted AES Encryption Using GCM. 178-185 - Dung Q. Nguyen, Li Weng, Bart Preneel

:
Radon Transform-Based Secure Image Hashing. 186-193 - Philipp Winter, Harald Lampesberger

, Markus Zeilinger, Eckehard Hermann:
On Detecting Abrupt Changes in Network Entropy Time Series. 194-205 - Krzysztof Juszczyszyn, Grzegorz Kolaczek

:
Motif-Based Attack Detection in Network Communication Graphs. 206-213 - Milica Milutinovic, Roel Peeters

, Bart De Decker:
Secure Negotiation for Manual Authentication Protocols. 214-221 - Mohamed Maachaoui, Anas Abou El Kalam

, Christian Fraboul:
A Secure One-Way Authentication Protocol in IMS Context. 222-231 - Mehdi Fallahpour, David Megías

:
High Capacity FFT-Based Audio Watermarking. 235-237 - Matthew Hall, Reinoud Koornstra, Miranda Mowbray:

Efficient Prevention of Credit Card Leakage from Enterprise Networks. 238-240 - Jana Fruth, Ronny Merkel, Jana Dittmann:

Security Warnings for Children's Smart Phones: A First Design Approach. 241-243 - Muhammad Asim, Luan Ibraimi, Milan Petkovic:

Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme. 244-246 - Daniel Slamanig

:
Anonymous Authentication from Public-Key Encryption Revisited - (Extended Abstract). 247-249
Keynotes
- Jaap-Henk Hoepman:

Mobile Identity Management. 253 - Ronald E. Leenes:

Who Needs Facebook Anyway - Privacy and Sociality in Social Network Sites. 254 - Moti Yung:

From Protecting a System to Protecting a Global Ecosystem. 255

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














