IFIP TC6 Open Digital Library

10. Communications and Multimedia Security 2006: Heraklion, Crete, Greece

Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings

Herbert Leitold, Evangelos P. Markatos

Springer, Lecture Notes in Computer Science 4237, ISBN: 3-540-47820-5


Advances in Network and Information Security

Computing of Trust in Ad-Hoc Networks.

Huafei Zhu, Feng Bao, Jianwei Liu


TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation.

Spyros Antonatos, Kostas G. Anagnostakis


On the Privacy Risks of Publishing Anonymized IP Network Traces.

Dimitris Koukis, Spyros Antonatos, Kostas G. Anagnostakis


Secure Mobile Notifications of Civilians in Case of a Disaster.

Heiko Rossnagel, Tobias Scherner


A Fair Anonymous Submission and Review System.

Vincent Naessens, Liesje Demuynck, Bart De Decker


Attribute Delegation Based on Ontologies and Context Information.

Isaac Agudo, Javier Lopez, José A. Montenegro


Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains.

David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen


One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange.

Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee


Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart.

Elias Athanasopoulos, Spyros Antonatos


Perturbing and Protecting a Traceable Block Cipher.

Julien Bringer, Hervé Chabanne, Emmanuelle Dottax


A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors.

Jörg Platte, Raúl Durán Díaz, Edwin Naroska


Timed Release Cryptography from Bilinear Pairings Using Hash Chains.

Konstantinos Chalkias, George Stephanides


Compression of Encrypted Visual Data.

Michael Gschwandtner, Andreas Uhl, Peter Wild


Selective Encryption for Hierarchical MPEG.

Heinz Hofbauer, Thomas Stütz, Andreas Uhl


Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods.

Xiangyang Luo, Chunfang Yang, Fenlin Liu


A Flexible and Open DRM Framework.

Kristof Verslype, Bart De Decker


PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies.

Giannakis Antoniou, Campbell Wilson, Dimitris Geneiatakis


A Privacy Agent in Context-Aware Ubiquitous Computing Environments.

Ni (Jenny) Zhang, Chris Todd


Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems.

Seng-Phil Hong, Sungmin Kang


Attack Graph Based Evaluation of Network Security.

Igor V. Kotenko, Mikhail Stepashkin


Information Modeling for Automated Risk Analysis.

Howard Chivers


Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.

Andriy Panchenko, Lexi Pimenidis