Filter your results
- 23
- 1
- 23
- 1
- 24
- 24
- 24
- 1
- 1
- 1
- 1
- 3
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Framework for Enforcing User-Based Authorization Policies on Packet Filter Firewalls13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.204-206, ⟨10.1007/978-3-642-32805-3_20⟩
Conference papers
hal-01540897v1
|
||
|
A Method for Reducing the Risk of Errors in Digital Forensic Investigations13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.99-106, ⟨10.1007/978-3-642-32805-3_8⟩
Conference papers
hal-01540896v1
|
||
|
A New Approach for Private Searches on Public-Key Encrypted Data13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.160-173, ⟨10.1007/978-3-642-32805-3_13⟩
Conference papers
hal-01540893v1
|
||
|
A New Approach to Commutative Watermarking-Encryption13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.117-130, ⟨10.1007/978-3-642-32805-3_10⟩
Conference papers
hal-01540882v1
|
||
|
Are 128 Bits Long Keys Possible in Watermarking?13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.191-191, ⟨10.1007/978-3-642-32805-3_15⟩
Conference papers
hal-01540890v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-7394, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-32805-3⟩
Books
hal-01540895v1
|
||
|
Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.89-98, ⟨10.1007/978-3-642-32805-3_7⟩
Conference papers
hal-01540887v1
|
||
|
Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.201-203, ⟨10.1007/978-3-642-32805-3_19⟩
Conference papers
hal-01540899v1
|
||
|
Data-Minimizing Authentication Goes Mobile13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.55-71, ⟨10.1007/978-3-642-32805-3_5⟩
Conference papers
hal-01540904v1
|
||
|
Efficiency of Secure Network Coding Schemes13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.145-159, ⟨10.1007/978-3-642-32805-3_12⟩
Conference papers
hal-01540886v1
|
||
|
Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.16-25, ⟨10.1007/978-3-642-32805-3_2⟩
Conference papers
hal-01540894v1
|
||
|
From Biometrics to Forensics: A Feature Collection and First Feature Fusion Approaches for Latent Fingerprint Detection Using a Chromatic White Light (CWL) Sensor13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.207-210, ⟨10.1007/978-3-642-32805-3_21⟩
Conference papers
hal-01540902v1
|
||
|
From Panopticon to Fresnel, Dispelling a False Sense of Security13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.238-242, ⟨10.1007/978-3-642-32805-3_24⟩
Conference papers
hal-01540889v1
|
||
|
Multi-level Authentication Based Single Sign-On for IMS Services13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.174-187, ⟨10.1007/978-3-642-32805-3_14⟩
Conference papers
hal-01540888v1
|
||
|
No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.72-86, ⟨10.1007/978-3-642-32805-3_6⟩
Conference papers
hal-01540901v1
|
||
|
OOXML File Analysis of the July 22nd Terrorist Manual13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.195-197, ⟨10.1007/978-3-642-32805-3_17⟩
Conference papers
hal-01540900v1
|
||
|
Practical Revocable Anonymous Credentials13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.211-213, ⟨10.1007/978-3-642-32805-3_22⟩
Conference papers
hal-01540883v1
|
||
|
Predicate-Tree Based Pretty Good Privacy of Data13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.192-194, ⟨10.1007/978-3-642-32805-3_16⟩
Conference papers
hal-01540891v1
|
||
|
Privacy Management in Global Organisations13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.217-237, ⟨10.1007/978-3-642-32805-3_23⟩
Conference papers
hal-01540892v1
|
||
|
Privacy-Preserving Scheduling Mechanism for eHealth Systems13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.198-200, ⟨10.1007/978-3-642-32805-3_18⟩
Conference papers
hal-01540885v1
|
||
|
Robust Resampling Detection in Digital Images13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.3-15, ⟨10.1007/978-3-642-32805-3_1⟩
Conference papers
hal-01540903v1
|
||
|
Security Analysis of Image-Based PUFs for Anti-counterfeiting13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.26-38, ⟨10.1007/978-3-642-32805-3_3⟩
Conference papers
hal-01540881v1
|
||
|
Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.107-116, ⟨10.1007/978-3-642-32805-3_9⟩
Conference papers
hal-01540884v1
|
||
|
Systematic Engineering of Control Protocols for Covert Channels13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.131-144, ⟨10.1007/978-3-642-32805-3_11⟩
Conference papers
hal-01540898v1
|