IFIP TC6 Open Digital Library

8. Communications and Multimedia Security 2004: Windermere, The Lake District, UK

Communications and Multimedia Security - 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom

David Chadwick, Bart Preneel

Springer, IFIP 175, ISBN: 978-0-387-24485-3


Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion Protocols.

Jan Iwanik, Marek Klonowski, Miroslaw Kutylowski


Personal Attributes and Privacy - How to ensure that private attribute management is not subverted by datamining.

Howard Chivers


Local Management of Credits and Debits in Mobile Ad Hoc Networks.

Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli


How Secure are Current Mobile Operating Systems?

Tobias Murmann, Heiko Rossnagel


An Overview of Security Issues and Techniques in Mobile Agents.

Mousa Alfalayleh, Ljiljana Brankovic


A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography.

Konstantinos Markantonakis, Keith Mayes


Mobile Trust Negotiation - Authentication and Authorization in Dynamic Mobile Networks.

Timothy W. van der Horst, Tore Sundelin, Kent E. Seamons, Charles D. Knutson


Weak Context Establishment Procedure for Mobility and Multi-Homing Management.

Vesa Torvinen, Jukka Ylitalo


A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components.

Lieven Desmet, Bart Jacobs 0002, Frank Piessens, Wouter Joosen


Threat Modelling for Web Services Based Web Applications.

Lieven Desmet, Bart Jacobs, Frank Piessens, Wouter Joosen


Threat Modelling for ASP.NET - Designing Secure Applications.

Rüidiger Grimm, Henrik Eichstädt


Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application.

Elisa Bertino, Danilo Bruschi, Stefano Franzoni, Igor Nai Fovino, Stefano Valtolina


Threat Modelling for Active Directory.

David Chadwick


Threat Modelling for Security Tokens in Web Applications.

Danny De Cock, Karel Wouters, Dries Schellekens, Dave Singelée, Bart Preneel


Analysis of the DVB Common Scrambling Algorithm.

Ralf-Philipp Weinmann, Kai Wirt


An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder.

Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas


Robust Visual Hashing Using JPEG 2000.

Roland Norcen, Andreas Uhl


A System for End-to-End Authentication of Adaptive Multimedia Content.

Takashi Suzuki, Zulfikar Ramzan, Hiroshi Fujimoto, Craig Gentry, Takehiro Nakayama, Ravi Jain


Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure.

David W. Chadwick, Sassa Otenko, Von Welch


Secure Role Based Messaging.

David W. Chadwick, Graeme Lunt, Gansen Zhao


Five Non-Technical Pillars of Network Information Security Management.

Elmarie Kritzinger, Sebastiaan H. von Solms