IFIP TC6 Open Digital Library

9. Communications and Multimedia Security 2005: Salzburg, Austria

Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings

Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl

Springer, Lecture Notes in Computer Science 3677, ISBN: 3-540-28791-4



Contents

Applied Cryptography

Fast Contract Signing with Batch Oblivious Transfer.

Lubica Staneková, Martin Stanek

 1-10

An Instruction Set Extension for Fast and Memory-Efficient AES Implementation.

Stefan Tillich, Johann Großschädl, Alexander Szekely

 11-21

Self-healing Key Distribution Schemes with Sponsorization.

Germán Sáez

 22-31

DRM & E-Commerce

Effective Protection Against Phishing and Web Spoofing.

Rolf Oppliger, Sebastian Gajek

 32-41

Identity Based DRM: Personal Entertainment Domain.

Paul Koster, Frank Kamperman, Peter Lenoir, Koen Vrielink

 42-54

Rights and Trust in Multimedia Information Management.

Jaime Delgado, Víctor Torres, Silvia Llorente, Eva Rodríguez

 55-64

Signature Amortization Using Multiple Connected Chains.

Qusai Abuein, Susumu Shibusawa

 65-76

Media Encryption

A Key Embedded Video Codec for Secure Video Multicast.

Hao Yin, Chuang Lin, Feng Qiu, Xiaowen Chu, Geyong Min

 77-87

Puzzle - A Novel Video Encryption Algorithm.

Fuwen Liu, Hartmut König

 88-97

Selective Image Encryption Using JBIG.

Roman Pfarrhofer, Andreas Uhl

 98-107

Multimedia Security

On Reversibility of Random Binning Techniques: Multimedia Perspectives.

Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Pedro Comesaña Alfaro, Thierry Pun

 108-118

A Graph-Theoretic Approach to Steganography.

Stefan Hetzl, Petra Mutzel

 119-128

Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme.

André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi

 129-139

Privacy

Video Surveillance: A Distributed Approach to Protect Privacy.

Martin Schaffer, Peter Schartner

 140-149

Privacy-Preserving Electronic Health Records.

Liesje Demuynck, Bart De Decker

 150-159

Using XACML for Privacy Control in SAML-Based Identity Federations.

Wolfgang Hommel

 160-169

Biometrics & Access Control

Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics.

Andrea Oermann, Jana Dittmann, Claus Vielhauer

 170-179

Decentralised Access Control in 802.11 Networks.

Marco Domenico Aime, Antonio Lioy, Gianluca Ramunno

 180-190

Multimodal Biometrics for Voice and Handwriting.

Claus Vielhauer, Tobias Scheidat

 191-199

Network Security

Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks.

Huafei Zhu, Feng Bao, Tieyan Li

 200-209

Polymorphic Code Detection with GA Optimized Markov Models.

Udo Payer, Stefan Kraxberger

 210-219

A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks.

Minsoo Lee, Sehyun Park

 220-229

Mobile Security

Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets.

Wiebke Dresp

 230-239

Assessment of Palm OS Susceptibility to Malicious Code Threats.

Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen

 240-249

Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication.

HyunGon Kim, ByeongKyun Oh

 250-260

Work in Progress Track

Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting.

Sascha Schimke, Athanasios Valsamakis, Claus Vielhauer, Yannis Stylianou

 261-263

INVUS: INtelligent VUlnerability Scanner.

Turker Akyuz, Ibrahim Sogukpinar

 264-265

Personal Rights Management- Enabling Privacy Rights in Digital Online Content.

Mina Deng, Lothar Fritsch, Klaus Kursawe

 266-268

Flexible Traitor Tracing for Anonymous Attacks.

Hongxia Jin, Jeffery Lotspiech

 269-270

Efficient Key Distribution for Closed Meetings in the Internet.

Fuwen Liu, Hartmut König

 271-272

Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics.

Taras Holotyak, Jessica J. Fridrich, Sviatoslav Voloshynovskiy

 273-274

Applying LR Cube Analysis to JSteg Detection.

Kwangsoo Lee, Changho Jung, Sangjin Lee, HyungJun Kim, Jongin Lim

 275-276

Digital Signatures Based on Invertible Watermarks for Video Authentication.

Enrico Hauer, Jana Dittmann, Martin Steinebach

 277-279

A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents.

Renato Villán, Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Yuriy Rytsar, Oleksiy J. Koval, Emre Topak, E. Rivera, Thierry Pun

 280-281

Semantically Extended Digital Watermarking Model for Multimedia Content.

Huajian Liu, Lucilla Croce Ferri, Martin Steinebach

 282-283

An Architecture for Secure Policy Enforcement in E-Government Services Deployment.

Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland

 284-285

Some Critical Aspects of the PKIX TSP.

Cristian Marinescu, Nicolae Tapus

 286-288

Motivations for a Theoretical Approach to WYSIWYS.

Antonio Lioy, Gianluca Ramunno, Marco Domenico Aime, Massimiliano Pala

 289-290

Special Session: XML Security

Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications.

Lars Ewers, Wolfgang Kubbilun, Lijun Liao, Jörg Schwenk

 291-300

Integrating XML Linked Time-Stamps in OASIS Digital Signature Services.

Ana Isabel González-Tablas Ferreres, Karel Wouters

 301-310

Trustworthy Verification and Visualisation of Multiple XML-Signatures.

Wolfgang Kubbilun, Sebastian Gajek, Michael Psarros, Jörg Schwenk

 311-320

Experience XML Security.

Dominik Schadow

 321-329

How to Make a Federation Manageable.

Christian Geuer-Pollmann

 330-338

XML Signatures in an Enterprise Service Bus Environment.

Eckehard Hermann, Dieter Kessler

 339-347

Using the XML Key Management Specification (and Breaking X.509 Rules as You Go).

Stephen Farrell, José Kahan

 348-357