Search - Communications and Multimedia Security Access content directly

Filter your results

23 results
Contributor/author Internal identifier : 200187
Image document

Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking

Thomas Stütz , Andreas Uhl
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.81-92, ⟨10.1007/978-3-642-13241-4_9⟩
Conference papers hal-01056365v1
Image document

A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)

Nicolas Racz , Edgar Weippl , Andreas Seufert
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.106-117, ⟨10.1007/978-3-642-13241-4_11⟩
Conference papers hal-01056386v1
Image document

SIP Proxies: New Reflectors in the Internet

Ge Zhang , Jordi Jaen Pallares , Yacine Rebahi , Simone Fischer-Hübner
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.142-153, ⟨10.1007/978-3-642-13241-4_14⟩
Conference papers hal-01056382v1
Image document

Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction

Karl Kümmel , Claus Vielhauer , Tobias Scheidat , Dirk Franke , Jana Dittmann
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.178-190, ⟨10.1007/978-3-642-13241-4_17⟩
Conference papers hal-01056380v1
Image document

A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks

Amitabh Saxena , Ben Soh
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.4-15, ⟨10.1007/978-3-642-13241-4_2⟩
Conference papers hal-01056372v1
Image document

Anonymous Client Authentication for Transport Layer Security

Kurt Dietrich
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.268-280, ⟨10.1007/978-3-642-13241-4_24⟩
Conference papers hal-01056373v1
Image document

Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption

Chul Sur , Chae Duk Jung , Youngho Park , Kyung Hyune Rhee
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.214-232, ⟨10.1007/978-3-642-13241-4_20⟩
Conference papers hal-01056377v1
Image document

Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare

Daniel Slamanig , Stefan Rass
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.201-213, ⟨10.1007/978-3-642-13241-4_19⟩
Conference papers hal-01056378v1
Image document

Watermark Detection for Video Bookmarking Using Mobile Phone Camera

Peter Meerwald , Andreas Uhl
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.64-74, ⟨10.1007/978-3-642-13241-4_7⟩
Conference papers hal-01056367v1
Image document

Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication

Stefan Rass , David Schuller , Christian Kollmitzer
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.166-177, ⟨10.1007/978-3-642-13241-4_16⟩
Conference papers hal-01056381v1
Image document

Statistical Detection of Malicious PE-Executables for Fast Offline Analysis

Ronny Merkel , Tobias Hoppe , Christian Kraetzer , Jana Dittmann
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.93-105, ⟨10.1007/978-3-642-13241-4_10⟩
Conference papers hal-01056387v1
Image document

Security in OpenSocial-Instrumented Social Networking Services

Matthias Häsel , Luigi Lo Iacono
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.40-52, ⟨10.1007/978-3-642-13241-4_5⟩
Conference papers hal-01056369v1
Image document

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems

Ulrich Rührmair , Stefan Katzenbeisser , Martin Steinebach , Sascha Zmudzinski
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers hal-01056366v1
Image document

Privacy Preserving Key Generation for Iris Biometrics

Christian Rathgeb , Andreas Uhl
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.191-200, ⟨10.1007/978-3-642-13241-4_18⟩
Conference papers hal-01056379v1
Image document

Security for XML Data Binding

Nils Gruschka , Luigi Lo Iacono
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.53-63, ⟨10.1007/978-3-642-13241-4_6⟩
Conference papers hal-01056368v1
Image document

Secure Communication Using Identity Based Encryption

Sebastian Roschke , Luan Ibraimi , Feng Cheng , Christoph Meinel
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.256-267, ⟨10.1007/978-3-642-13241-4_23⟩
Conference papers hal-01056374v1
Image document

Tor HTTP Usage and Information Leakage

Markus Huber , Martin Mulazzani , Edgar Weippl
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.245-255, ⟨10.1007/978-3-642-13241-4_22⟩
Conference papers hal-01056375v1
Image document

Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion

Saif Al-Kuwari , Stephen D. Wolthusen
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.16-27, ⟨10.1007/978-3-642-13241-4_3⟩
Conference papers hal-01056371v1
Image document

Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks

Ge Zhang , Simone Fischer-Hübner
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.130-141, ⟨10.1007/978-3-642-13241-4_13⟩
Conference papers hal-01056384v1
Image document

Business and IT Continuity Benchmarking

Wolfgang Neudorfer , Louis Marinos , Ingrid Schaumüller-Bichl
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.118-129, ⟨10.1007/978-3-642-13241-4_12⟩
Conference papers hal-01056385v1
Image document

Throwing a MonkeyWrench into Web Attackers Plans

Armin Büscher , Michael Meier , Ralf Benzmüller
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.28-39, ⟨10.1007/978-3-642-13241-4_4⟩
Conference papers hal-01056370v1

Communications and Multimedia Security

Bart De Decker , Ingrid Schaumüller-Bichl
Springer, LNCS-6109, 2010, Lecture Notes in Computer Science, 978-3-642-13240-7. ⟨10.1007/978-3-642-13241-4⟩
Books hal-01555320v1
Image document

Detecting Hidden Encrypted Volumes

Christopher Hargreaves , Howard Chivers
11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.233-244, ⟨10.1007/978-3-642-13241-4_21⟩
Conference papers hal-01056376v1