


default search action
13th Communications and Multimedia Security 2012: Canterbury, UK
- Bart De Decker, David W. Chadwick:

Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings. Lecture Notes in Computer Science 7394, Springer 2012, ISBN 978-3-642-32804-6
Research Papers
- Hieu Cuong Nguyen, Stefan Katzenbeisser:

Robust Resampling Detection in Digital Images. 3-15 - Karl Kümmel, Tobias Scheidat, Claus Vielhauer, Jana Dittmann:

Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries. 16-25 - Saloomeh Shariati, François Koeune, François-Xavier Standaert

:
Security Analysis of Image-Based PUFs for Anti-counterfeiting. 26-38 - Mouhamadou L. Diong, Patrick Bas, Chloé Pelle, Wadih Sawaya:

Document Authentication Using 2D Codes: Maximizing the Decoding Performance Using Statistical Inference. 39-54 - Patrik Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon

, Vincent Naessens, Dieter Sommer:
Data-Minimizing Authentication Goes Mobile. 55-71 - Zhuo Wei, Xuhua Ding

, Robert Huijie Deng
, Yongdong Wu:
No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption. 72-86
Work in Progress
- Andrey Makrushin

, Tobias Kiertscher, Robert Fischer, Stefan Gruhn, Claus Vielhauer, Jana Dittmann:
Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans. 89-98 - Graeme Horsman, Christopher Laing

, Paul Vickers
:
A Method for Reducing the Risk of Errors in Digital Forensic Investigations. 99-106 - Tobias Scheidat, Karl Kümmel, Claus Vielhauer:

Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance. 107-116 - Roland Schmitz, Shujun Li

, Christos Grecos, Xinpeng Zhang:
A New Approach to Commutative Watermarking-Encryption. 117-130 - Steffen Wendzel

, Jörg Keller:
Systematic Engineering of Control Protocols for Covert Channels. 131-144 - Elke Franz, Stefan Pfennig, André Fischer:

Efficiency of Secure Network Coding Schemes. 145-159 - Amar Siad:

A New Approach for Private Searches on Public-Key Encrypted Data. 160-173 - Mohamed Maachaoui, Anas Abou El Kalam

, Christian Fraboul, Abdellah Ait Ouahman:
Multi-level Authentication Based Single Sign-On for IMS Services. 174-187
Extended Abstracts
- Patrick Bas, Teddy Furon:

Are 128 Bits Long Keys Possible in Watermarking? 191 - William Perrizo, Arjun G. Roy:

Predicate-Tree Based Pretty Good Privacy of Data. 192-194 - Hanno Langweg:

OOXML File Analysis of the July 22nd Terrorist Manual. 195-197 - Milica Milutinovic, Vincent Naessens, Bart De Decker:

Privacy-Preserving Scheduling Mechanism for eHealth Systems. 198-200 - Jürgen Fuß

, Wolfgang Kastl, Robert Kolmhofer, Georg Schönberger, Florian Wex:
Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors. 201-203 - André Zúquete

, Pedro Correia, Miguel Rocha:
A Framework for Enforcing User-Based Authorization Policies on Packet Filter Firewalls. 204-206 - Robert Fischer, Tobias Kiertscher, Stefan Gruhn, Tobias Scheidat, Claus Vielhauer:

From Biometrics to Forensics: A Feature Collection and First Feature Fusion Approaches for Latent Fingerprint Detection Using a Chromatic White Light (CWL) Sensor. 207-210 - Jan Hajny, Lukas Malina

:
Practical Revocable Anonymous Credentials. 211-213
Keynotes
- Siani Pearson

:
Privacy Management in Global Organisations. 217-237 - Jon Crowcroft

, Ian Brown:
From Panopticon to Fresnel, Dispelling a False Sense of Security. 238-242

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














