Filter your results
- 22
- 1
- 22
- 1
- 23
- 23
- 23
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.81-92, ⟨10.1007/978-3-642-13241-4_9⟩
Conference papers
hal-01056365v1
|
||
|
A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.106-117, ⟨10.1007/978-3-642-13241-4_11⟩
Conference papers
hal-01056386v1
|
||
|
SIP Proxies: New Reflectors in the Internet11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.142-153, ⟨10.1007/978-3-642-13241-4_14⟩
Conference papers
hal-01056382v1
|
||
|
Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.178-190, ⟨10.1007/978-3-642-13241-4_17⟩
Conference papers
hal-01056380v1
|
||
|
A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.4-15, ⟨10.1007/978-3-642-13241-4_2⟩
Conference papers
hal-01056372v1
|
||
|
Anonymous Client Authentication for Transport Layer Security11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.268-280, ⟨10.1007/978-3-642-13241-4_24⟩
Conference papers
hal-01056373v1
|
||
|
Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.214-232, ⟨10.1007/978-3-642-13241-4_20⟩
Conference papers
hal-01056377v1
|
||
|
Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.201-213, ⟨10.1007/978-3-642-13241-4_19⟩
Conference papers
hal-01056378v1
|
||
|
Watermark Detection for Video Bookmarking Using Mobile Phone Camera11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.64-74, ⟨10.1007/978-3-642-13241-4_7⟩
Conference papers
hal-01056367v1
|
||
|
Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.166-177, ⟨10.1007/978-3-642-13241-4_16⟩
Conference papers
hal-01056381v1
|
||
|
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.93-105, ⟨10.1007/978-3-642-13241-4_10⟩
Conference papers
hal-01056387v1
|
||
|
Security in OpenSocial-Instrumented Social Networking Services11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.40-52, ⟨10.1007/978-3-642-13241-4_5⟩
Conference papers
hal-01056369v1
|
||
|
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers
hal-01056366v1
|
||
|
Privacy Preserving Key Generation for Iris Biometrics11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.191-200, ⟨10.1007/978-3-642-13241-4_18⟩
Conference papers
hal-01056379v1
|
||
|
Security for XML Data Binding11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.53-63, ⟨10.1007/978-3-642-13241-4_6⟩
Conference papers
hal-01056368v1
|
||
|
Secure Communication Using Identity Based Encryption11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.256-267, ⟨10.1007/978-3-642-13241-4_23⟩
Conference papers
hal-01056374v1
|
||
|
Tor HTTP Usage and Information Leakage11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.245-255, ⟨10.1007/978-3-642-13241-4_22⟩
Conference papers
hal-01056375v1
|
||
|
Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.16-27, ⟨10.1007/978-3-642-13241-4_3⟩
Conference papers
hal-01056371v1
|
||
|
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.130-141, ⟨10.1007/978-3-642-13241-4_13⟩
Conference papers
hal-01056384v1
|
||
|
Business and IT Continuity Benchmarking11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.118-129, ⟨10.1007/978-3-642-13241-4_12⟩
Conference papers
hal-01056385v1
|
||
|
Throwing a MonkeyWrench into Web Attackers Plans11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.28-39, ⟨10.1007/978-3-642-13241-4_4⟩
Conference papers
hal-01056370v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-6109, 2010, Lecture Notes in Computer Science, 978-3-642-13240-7. ⟨10.1007/978-3-642-13241-4⟩
Books
hal-01555320v1
|
||
|
Detecting Hidden Encrypted Volumes11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.233-244, ⟨10.1007/978-3-642-13241-4_21⟩
Conference papers
hal-01056376v1
|