12. Communications and Multimedia Security 2011: Ghent, Belgium
Communications and Multimedia Security, 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings
Bart De Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl
Springer, Lecture Notes in Computer Science 7025, ISBN: 978-3-642-24711-8
Contents
Research Papers
Analysis of Revocation Strategies for Anonymous Idemix Credentials.
Jorn Lapon, Markulf Kohlweiss, Bart De Decker, Vincent Naessens
3-17
A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks.
Mahdi R. Alaghband, Mohammad Reza Aref
18-31
Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version).
Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider 0003
32-44
Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms.
Kurt Dietrich, Johannes Winter, Granit Luzhnica, Siegfried Podesser
45-58
Ronny Merkel, Jana Dittmann, Claus Vielhauer
59-71
Two-Factor Biometric Recognition with Integrated Tamper-Protection Watermarking.
Reinhard Huber, Herbert Stögner, Andreas Uhl
72-84
Karl Kümmel, Tobias Scheidat, Christian Arndt, Claus Vielhauer
85-93
Dynamic Software Birthmark for Java Based on Heap Memory Analysis.
Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu
94-107
Work in Progress
Mapping between Classical Risk Management and Game Theoretical Approaches.
Lisa Rajbhandari, Einar Snekkenes
147-154
Digital Signatures: How Close Is Europe to Truly Interoperable Solutions?
Konstantinos Rantos
155-162
A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning.
Koen Decroix, Milica Milutinovic, Bart De Decker, Vincent Naessens
163-170
A Modular Test Platform for Evaluation of Security Protocols in NFC Applications.
Geoffrey Ottoy, Jeroen Martens, Nick Saeys, Bart Preneel, Lieven De Strycker, Jean-Pierre Goemaere, Tom Hamelinckx
171-177
On Detecting Abrupt Changes in Network Entropy Time Series.
Philipp Winter, Harald Lampesberger, Markus Zeilinger, Eckehard Hermann
194-205
Motif-Based Attack Detection in Network Communication Graphs.
Krzysztof Juszczyszyn, Grzegorz Kolaczek
206-213
Secure Negotiation for Manual Authentication Protocols.
Milica Milutinovic, Roel Peeters, Bart De Decker
214-221
A Secure One-Way Authentication Protocol in IMS Context.
Mohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul
222-231
Efficient Prevention of Credit Card Leakage from Enterprise Networks.
Matthew Hall, Reinoud Koornstra, Miranda Mowbray
238-240
Security Warnings for Children's Smart Phones: A First Design Approach.
Jana Fruth, Ronny Merkel, Jana Dittmann
241-243
Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme.
Muhammad Asim, Luan Ibraimi, Milan Petkovic
244-246
Anonymous Authentication from Public-Key Encryption Revisited - (Extended Abstract).
Daniel Slamanig
247-249
Keynotes