9. Communications and Multimedia Security 2005: Salzburg, Austria
Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings
Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl
Springer, Lecture Notes in Computer Science 3677, ISBN: 3-540-28791-4
Contents
Applied Cryptography
An Instruction Set Extension for Fast and Memory-Efficient AES Implementation.
Stefan Tillich, Johann Großschädl, Alexander Szekely
11-21
DRM & E-Commerce
Identity Based DRM: Personal Entertainment Domain.
Paul Koster, Frank Kamperman, Peter Lenoir, Koen Vrielink
42-54
Rights and Trust in Multimedia Information Management.
Jaime Delgado, Víctor Torres, Silvia Llorente, Eva Rodríguez
55-64
Media Encryption
A Key Embedded Video Codec for Secure Video Multicast.
Hao Yin, Chuang Lin, Feng Qiu, Xiaowen Chu, Geyong Min
77-87
Multimedia Security
On Reversibility of Random Binning Techniques: Multimedia Perspectives.
Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Pedro Comesaña Alfaro, Thierry Pun
108-118
Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme.
André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
129-139
Privacy
Video Surveillance: A Distributed Approach to Protect Privacy.
Martin Schaffer, Peter Schartner
140-149
Biometrics & Access Control
Andrea Oermann, Jana Dittmann, Claus Vielhauer
170-179
Decentralised Access Control in 802.11 Networks.
Marco Domenico Aime, Antonio Lioy, Gianluca Ramunno
180-190
Network Security
Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks.
Huafei Zhu, Feng Bao, Tieyan Li
200-209
A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks.
Minsoo Lee, Sehyun Park
220-229
Mobile Security
Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets.
Wiebke Dresp
230-239
Assessment of Palm OS Susceptibility to Malicious Code Threats.
Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen
240-249
Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication.
HyunGon Kim, ByeongKyun Oh
250-260
Work in Progress Track
Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting.
Sascha Schimke, Athanasios Valsamakis, Claus Vielhauer, Yannis Stylianou
261-263
Personal Rights Management- Enabling Privacy Rights in Digital Online Content.
Mina Deng, Lothar Fritsch, Klaus Kursawe
266-268
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics.
Taras Holotyak, Jessica J. Fridrich, Sviatoslav Voloshynovskiy
273-274
Applying LR Cube Analysis to JSteg Detection.
Kwangsoo Lee, Changho Jung, Sangjin Lee, HyungJun Kim, Jongin Lim
275-276
Digital Signatures Based on Invertible Watermarks for Video Authentication.
Enrico Hauer, Jana Dittmann, Martin Steinebach
277-279
A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents.
Renato Villán, Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Yuriy Rytsar, Oleksiy J. Koval, Emre Topak, E. Rivera, Thierry Pun
280-281
Semantically Extended Digital Watermarking Model for Multimedia Content.
Huajian Liu, Lucilla Croce Ferri, Martin Steinebach
282-283
An Architecture for Secure Policy Enforcement in E-Government Services Deployment.
Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland
284-285
Motivations for a Theoretical Approach to WYSIWYS.
Antonio Lioy, Gianluca Ramunno, Marco Domenico Aime, Massimiliano Pala
289-290
Special Session: XML Security
Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications.
Lars Ewers, Wolfgang Kubbilun, Lijun Liao, Jörg Schwenk
291-300
Integrating XML Linked Time-Stamps in OASIS Digital Signature Services.
Ana Isabel González-Tablas Ferreres, Karel Wouters
301-310
Trustworthy Verification and Visualisation of Multiple XML-Signatures.
Wolfgang Kubbilun, Sebastian Gajek, Michael Psarros, Jörg Schwenk
311-320
Using the XML Key Management Specification (and Breaking X.509 Rules as You Go).
Stephen Farrell, José Kahan
348-357