IFIP TC6 Open Digital Library

9. Communications and Multimedia Security 2005: Salzburg, Austria

Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings

Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl

Springer, Lecture Notes in Computer Science 3677, ISBN: 3-540-28791-4


Applied Cryptography

Fast Contract Signing with Batch Oblivious Transfer.

Lubica Staneková, Martin Stanek


An Instruction Set Extension for Fast and Memory-Efficient AES Implementation.

Stefan Tillich, Johann Großschädl, Alexander Szekely


Self-healing Key Distribution Schemes with Sponsorization.

Germán Sáez


DRM & E-Commerce

Effective Protection Against Phishing and Web Spoofing.

Rolf Oppliger, Sebastian Gajek


Identity Based DRM: Personal Entertainment Domain.

Paul Koster, Frank Kamperman, Peter Lenoir, Koen Vrielink


Rights and Trust in Multimedia Information Management.

Jaime Delgado, Víctor Torres, Silvia Llorente, Eva Rodríguez


Signature Amortization Using Multiple Connected Chains.

Qusai Abuein, Susumu Shibusawa


Media Encryption

A Key Embedded Video Codec for Secure Video Multicast.

Hao Yin, Chuang Lin, Feng Qiu, Xiaowen Chu, Geyong Min


Puzzle - A Novel Video Encryption Algorithm.

Fuwen Liu, Hartmut König


Selective Image Encryption Using JBIG.

Roman Pfarrhofer, Andreas Uhl


Multimedia Security

On Reversibility of Random Binning Techniques: Multimedia Perspectives.

Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Pedro Comesaña Alfaro, Thierry Pun


A Graph-Theoretic Approach to Steganography.

Stefan Hetzl, Petra Mutzel


Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme.

André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi



Video Surveillance: A Distributed Approach to Protect Privacy.

Martin Schaffer, Peter Schartner


Privacy-Preserving Electronic Health Records.

Liesje Demuynck, Bart De Decker


Using XACML for Privacy Control in SAML-Based Identity Federations.

Wolfgang Hommel


Biometrics & Access Control

Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics.

Andrea Oermann, Jana Dittmann, Claus Vielhauer


Decentralised Access Control in 802.11 Networks.

Marco Domenico Aime, Antonio Lioy, Gianluca Ramunno


Multimodal Biometrics for Voice and Handwriting.

Claus Vielhauer, Tobias Scheidat


Network Security

Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks.

Huafei Zhu, Feng Bao, Tieyan Li


Polymorphic Code Detection with GA Optimized Markov Models.

Udo Payer, Stefan Kraxberger


A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks.

Minsoo Lee, Sehyun Park


Mobile Security

Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets.

Wiebke Dresp


Assessment of Palm OS Susceptibility to Malicious Code Threats.

Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen


Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication.

HyunGon Kim, ByeongKyun Oh


Work in Progress Track

Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting.

Sascha Schimke, Athanasios Valsamakis, Claus Vielhauer, Yannis Stylianou


INVUS: INtelligent VUlnerability Scanner.

Turker Akyuz, Ibrahim Sogukpinar


Personal Rights Management- Enabling Privacy Rights in Digital Online Content.

Mina Deng, Lothar Fritsch, Klaus Kursawe


Flexible Traitor Tracing for Anonymous Attacks.

Hongxia Jin, Jeffery Lotspiech


Efficient Key Distribution for Closed Meetings in the Internet.

Fuwen Liu, Hartmut König


Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics.

Taras Holotyak, Jessica J. Fridrich, Sviatoslav Voloshynovskiy


Applying LR Cube Analysis to JSteg Detection.

Kwangsoo Lee, Changho Jung, Sangjin Lee, HyungJun Kim, Jongin Lim


Digital Signatures Based on Invertible Watermarks for Video Authentication.

Enrico Hauer, Jana Dittmann, Martin Steinebach


A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents.

Renato Villán, Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Yuriy Rytsar, Oleksiy J. Koval, Emre Topak, E. Rivera, Thierry Pun


Semantically Extended Digital Watermarking Model for Multimedia Content.

Huajian Liu, Lucilla Croce Ferri, Martin Steinebach


An Architecture for Secure Policy Enforcement in E-Government Services Deployment.

Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland


Some Critical Aspects of the PKIX TSP.

Cristian Marinescu, Nicolae Tapus


Motivations for a Theoretical Approach to WYSIWYS.

Antonio Lioy, Gianluca Ramunno, Marco Domenico Aime, Massimiliano Pala


Special Session: XML Security

Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications.

Lars Ewers, Wolfgang Kubbilun, Lijun Liao, Jörg Schwenk


Integrating XML Linked Time-Stamps in OASIS Digital Signature Services.

Ana Isabel González-Tablas Ferreres, Karel Wouters


Trustworthy Verification and Visualisation of Multiple XML-Signatures.

Wolfgang Kubbilun, Sebastian Gajek, Michael Psarros, Jörg Schwenk


Experience XML Security.

Dominik Schadow


How to Make a Federation Manageable.

Christian Geuer-Pollmann


XML Signatures in an Enterprise Service Bus Environment.

Eckehard Hermann, Dieter Kessler


Using the XML Key Management Specification (and Breaking X.509 Rules as You Go).

Stephen Farrell, José Kahan