Search - Communications and Multimedia Security Access content directly

Filter your results

30 results
Contributor/author Internal identifier : 200187
Image document

On Detecting Abrupt Changes in Network Entropy Time Series

Philipp Winter , Harald Lampesberger , Markus Zeilinger , Eckehard Hermann
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.194-205, ⟨10.1007/978-3-642-24712-5_18⟩
Conference papers hal-01596209v1
Image document

Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme

Muhammad Asim , Luan Ibraimi , Milan Petković
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.244-246, ⟨10.1007/978-3-642-24712-5_25⟩
Conference papers hal-01596187v1
Image document

A Secure Perceptual Hash Algorithm for Image Content Authentication

Li Weng , Bart Preneel
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.108-121, ⟨10.1007/978-3-642-24712-5_9⟩
Conference papers hal-01596205v1
Image document

Analysis of Revocation Strategies for Anonymous Idemix Credentials

Jorn Lapon , Markulf Kohlweiss , Bart De Decker , Vincent Naessens
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.3-17, ⟨10.1007/978-3-642-24712-5_1⟩
Conference papers hal-01596188v1
Image document

A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks

Mahdi R. Alagheband , Mohammad Reza Aref
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.18-31, ⟨10.1007/978-3-642-24712-5_2⟩
Conference papers hal-01596197v1
Image document

Digital Signatures: How Close Is Europe to Truly Interoperable Solutions?

Konstantinos Rantos
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.155-162, ⟨10.1007/978-3-642-24712-5_13⟩
Conference papers hal-01596183v1
Image document

Mobile Identity Management

Jaap-Henk Hoepman
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.253-253, ⟨10.1007/978-3-642-24712-5_27⟩
Conference papers hal-01596192v1
Image document

Two-Factor Biometric Recognition with Integrated Tamper-Protection Watermarking

Reinhard Huber , Herbert Stögner , Andreas Uhl
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.72-84, ⟨10.1007/978-3-642-24712-5_6⟩
Conference papers hal-01596199v1
Image document

Security Warnings for Children’s Smart Phones: A First Design Approach

Jana Dittmann , Jana Fruth , Ronny Merkel
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.241-243, ⟨10.1007/978-3-642-24712-5_24⟩
Conference papers hal-01596186v1
Image document

Low-Attention Forwarding for Mobile Network Covert Channels

Steffen Wendzel , Jörg Keller
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.122-133, ⟨10.1007/978-3-642-24712-5_10⟩
Conference papers hal-01596189v1
Image document

Efficient Prevention of Credit Card Leakage from Enterprise Networks

Matthew Hall , Reinoud Koornstra , Miranda Mowbray
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.238-240, ⟨10.1007/978-3-642-24712-5_23⟩
Conference papers hal-01596206v1
Image document

Secure Negotiation for Manual Authentication Protocols

Milica Milutinovic , Roel Peeters , Bart De Decker
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.214-221, ⟨10.1007/978-3-642-24712-5_20⟩
Conference papers hal-01596202v1
Image document

High Capacity FFT-Based Audio Watermarking

Mehdi Fallahpour , David Megias
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.235-237, ⟨10.1007/978-3-642-24712-5_22⟩
Conference papers hal-01596185v1
Image document

Cryptanalysis of a SIP Authentication Scheme

Fuwen Liu , Hartmut Koenig
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.134-143, ⟨10.1007/978-3-642-24712-5_11⟩
Conference papers hal-01596196v1
Image document

Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting

Karl Kümmel , Tobias Scheidat , Christian Arndt , Claus Vielhauer
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.85-93, ⟨10.1007/978-3-642-24712-5_7⟩
Conference papers hal-01596201v1
Image document

GPU-Assisted AES Encryption Using GCM

Georg Schönberger , Jürgen Fuss
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.178-185, ⟨10.1007/978-3-642-24712-5_16⟩
Conference papers hal-01596207v1
Image document

Who Needs Facebook Anyway - Privacy and Sociality in Social Network Sites

Ronald E. Leenes
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.254-254, ⟨10.1007/978-3-642-24712-5_28⟩
Conference papers hal-01596190v1
Image document

Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature

Ronny Merkel , Jana Dittmann , Claus Vielhauer
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.59-71, ⟨10.1007/978-3-642-24712-5_5⟩
Conference papers hal-01596193v1
Image document

Dynamic Software Birthmark for Java Based on Heap Memory Analysis

Patrick Chan , Lucas Hui , S. M. Yiu
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.94-107, ⟨10.1007/978-3-642-24712-5_8⟩
Conference papers hal-01596200v1
Image document

Motif-Based Attack Detection in Network Communication Graphs

Krzysztof Juszczyszyn , Grzegorz Kołaczek
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.206-213, ⟨10.1007/978-3-642-24712-5_19⟩
Conference papers hal-01596210v1

Communications and Multimedia Security

Bart De Decker , Jorn Lapon , Vincent Naessens , Andreas Uhl
Springer, LNCS-7025, 2011, Lecture Notes in Computer Science, 978-3-642-24711-8. ⟨10.1007/978-3-642-24712-5⟩
Books hal-01596212v1
Image document

Anonymous Authentication from Public-Key Encryption Revisited

Daniel Slamanig
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.247-249, ⟨10.1007/978-3-642-24712-5_26⟩
Conference papers hal-01596203v1
Image document

Mapping between Classical Risk Management and Game Theoretical Approaches

Lisa Rajbhandari , Einar Arthur Snekkenes
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.147-154, ⟨10.1007/978-3-642-24712-5_12⟩
Conference papers hal-01596184v1
Image document

A Secure One-Way Authentication Protocol in IMS Context

Mohamed Maachaoui , Anas Abou El Kalam , Christian Fraboul
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.222-231, ⟨10.1007/978-3-642-24712-5_21⟩
Conference papers hal-01596208v1
Image document

Twin Clouds: Secure Cloud Computing with Low Latency

Sven Bugiel , Stefan Nürnberger , Ahmad-Reza Sadeghi , Thomas Schneider
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.32-44, ⟨10.1007/978-3-642-24712-5_3⟩
Conference papers hal-01596191v1
Image document

From Protecting a System to Protecting a Global Ecosystem

Moti Yung
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.255-255, ⟨10.1007/978-3-642-24712-5_29⟩
Conference papers hal-01596198v1
Image document

Radon Transform-Based Secure Image Hashing

Dung Q. Nguyen , Li Weng , Bart Preneel
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.186-193, ⟨10.1007/978-3-642-24712-5_17⟩
Conference papers hal-01596211v1
Image document

A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning

Koen Decroix , Milica Milutinovic , Bart De Decker , Vincent Naessens
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.163-170, ⟨10.1007/978-3-642-24712-5_14⟩
Conference papers hal-01596195v1
Image document

Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms

Kurt Dietrich , Johannes Winter , Granit Luzhnica , Siegfried Podesser
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.45-58, ⟨10.1007/978-3-642-24712-5_4⟩
Conference papers hal-01596194v1
Image document

A Modular Test Platform for Evaluation of Security Protocols in NFC Applications

Geoffrey Ottoy , Jeroen Martens , Nick Saeys , Bart Preneel , Lieven De Strycker , et al.
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.171-177, ⟨10.1007/978-3-642-24712-5_15⟩
Conference papers hal-01596204v1