IFIP TC6 Open Digital Library

12. Communications and Multimedia Security 2011: Ghent, Belgium

Communications and Multimedia Security, 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings

Bart De Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl

Springer, Lecture Notes in Computer Science 7025, ISBN: 978-3-642-24711-8


Research Papers

Analysis of Revocation Strategies for Anonymous Idemix Credentials.

Jorn Lapon, Markulf Kohlweiss, Bart De Decker, Vincent Naessens


A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks.

Mahdi R. Alaghband, Mohammad Reza Aref


Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version).

Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider 0003


Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms.

Kurt Dietrich, Johannes Winter, Granit Luzhnica, Siegfried Podesser


Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature.

Ronny Merkel, Jana Dittmann, Claus Vielhauer


Two-Factor Biometric Recognition with Integrated Tamper-Protection Watermarking.

Reinhard Huber, Herbert Stögner, Andreas Uhl


Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting.

Karl Kümmel, Tobias Scheidat, Christian Arndt, Claus Vielhauer


Dynamic Software Birthmark for Java Based on Heap Memory Analysis.

Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu


A Secure Perceptual Hash Algorithm for Image Content Authentication.

Li Weng, Bart Preneel


Low-Attention Forwarding for Mobile Network Covert Channels.

Steffen Wendzel, Jörg Keller


Cryptanalysis of a SIP Authentication Scheme.

Fuwen Liu, Hartmut König


Work in Progress

Mapping between Classical Risk Management and Game Theoretical Approaches.

Lisa Rajbhandari, Einar Snekkenes


Digital Signatures: How Close Is Europe to Truly Interoperable Solutions?

Konstantinos Rantos


A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning.

Koen Decroix, Milica Milutinovic, Bart De Decker, Vincent Naessens


A Modular Test Platform for Evaluation of Security Protocols in NFC Applications.

Geoffrey Ottoy, Jeroen Martens, Nick Saeys, Bart Preneel, Lieven De Strycker, Jean-Pierre Goemaere, Tom Hamelinckx


GPU-Assisted AES Encryption Using GCM.

Georg Schönberger, Jürgen Fuß


Radon Transform-Based Secure Image Hashing.

Dung Q. Nguyen, Li Weng, Bart Preneel


On Detecting Abrupt Changes in Network Entropy Time Series.

Philipp Winter, Harald Lampesberger, Markus Zeilinger, Eckehard Hermann


Motif-Based Attack Detection in Network Communication Graphs.

Krzysztof Juszczyszyn, Grzegorz Kolaczek


Secure Negotiation for Manual Authentication Protocols.

Milica Milutinovic, Roel Peeters, Bart De Decker


A Secure One-Way Authentication Protocol in IMS Context.

Mohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul


High Capacity FFT-Based Audio Watermarking.

Mehdi Fallahpour, David Megías


Efficient Prevention of Credit Card Leakage from Enterprise Networks.

Matthew Hall, Reinoud Koornstra, Miranda Mowbray


Security Warnings for Children's Smart Phones: A First Design Approach.

Jana Fruth, Ronny Merkel, Jana Dittmann


Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme.

Muhammad Asim, Luan Ibraimi, Milan Petkovic


Anonymous Authentication from Public-Key Encryption Revisited - (Extended Abstract).

Daniel Slamanig



Mobile Identity Management.

Jaap-Henk Hoepman


Who Needs Facebook Anyway - Privacy and Sociality in Social Network Sites.

Ronald E. Leenes


From Protecting a System to Protecting a Global Ecosystem.

Moti Yung