Table of Contents
|
Communications and Multimedia Security Bart Decker, Ingrid Schaumüller-Bichl |
Front Matter |
WiFi and RF Security
|
A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks Amitabh Saxena, Ben Soh |
4-15 |
Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion Saif Al-Kuwari, Stephen D. Wolthusen |
16-27 |
XML and Web Services Security
|
Throwing a MonkeyWrench into Web Attackers Plans Armin Büscher, Michael Meier, Ralf Benzmüller |
28-39 |
Security in OpenSocial-Instrumented Social Networking Services Matthias Häsel, Luigi Lo Iacono |
40-52 |
Security for XML Data Binding Nils Gruschka, Luigi Lo Iacono |
53-63 |
Watermarking and Multimedia Security
|
Watermark Detection for Video Bookmarking Using Mobile Phone Camera Peter Meerwald, Andreas Uhl |
64-74 |
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems Ulrich Rührmair, Stefan Katzenbeisser, Martin Steinebach, Sascha Zmudzinski |
75-80 |
Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking Thomas Stütz, Andreas Uhl |
81-92 |
Analysis and Detection of Malicious Code and Risk Management
|
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis Ronny Merkel, Tobias Hoppe, Christian Kraetzer, Jana Dittmann |
93-105 |
A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC) Nicolas Racz, Edgar Weippl, Andreas Seufert |
106-117 |
Business and IT Continuity Benchmarking Wolfgang Neudorfer, Louis Marinos, Ingrid Schaumüller-Bichl |
118-129 |
VoIP Security
|
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks Ge Zhang, Simone Fischer-Hübner |
130-141 |
SIP Proxies: New Reflectors in the Internet Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi, Simone Fischer-Hübner |
142-153 |
Analysis of token and ticket based mechanisms for current voIP security issues and enhancement proposal Patrick Battistello, Cyril Delétré |
154 - 165 |
Biometrics
|
Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication Stefan Rass, David Schuller, Christian Kollmitzer |
166-177 |
Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction Karl Kümmel, Claus Vielhauer, Tobias Scheidat, Dirk Franke, Jana Dittmann |
178-190 |
Privacy Preserving Key Generation for Iris Biometrics Christian Rathgeb, Andreas Uhl |
191-200 |
Applied Cryptography
|
Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare Daniel Slamanig, Stefan Rass |
201-213 |
Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption Chul Sur, Chae Duk Jung, Youngho Park, Kyung Hyune Rhee |
214-232 |
Detecting Hidden Encrypted Volumes Christopher Hargreaves, Howard Chivers |
233-244 |
Secure Communications
|
Tor HTTP Usage and Information Leakage Markus Huber, Martin Mulazzani, Edgar Weippl |
245-255 |
Secure Communication Using Identity Based Encryption Sebastian Roschke, Luan Ibraimi, Feng Cheng, Christoph Meinel |
256-267 |
Anonymous Client Authentication for Transport Layer Security Kurt Dietrich |
268-280 |