Communications and Multimedia Security. Advanced Techniques for Network and Data Protection (eBook, PDF)
7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings
Redaktion: Lioy, Antonio; Mazzocchi, Daniele
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection (eBook, PDF)
7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings
Redaktion: Lioy, Antonio; Mazzocchi, Daniele
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 7th IFIP International Conference on Communications and Multimedia Security, CMS 2003, held in Torino, Italy in October 2003. The 21 revised full papers presented were carefully reviewed and selected for presentation. The papers are organized in topical sections on cryptography, network security, mobile and wireless network security, trust and privacy, application security, and multimedia security.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 3.68MB
Andere Kunden interessierten sich auch für
Communications and Multimedia Security (eBook, PDF)40,95 €
Cryptology and Network Security (eBook, PDF)40,95 €
Privacy Enhancing Technologies (eBook, PDF)40,95 €
Transactions on Data Hiding and Multimedia Security I (eBook, PDF)40,95 €
Information Hiding (eBook, PDF)40,95 €
Transactions on Data Hiding and Multimedia Security III (eBook, PDF)40,95 €
Transactions on Data Hiding and Multimedia Security IV (eBook, PDF)40,95 €-
-
-
This book constitutes the refereed proceedings of the 7th IFIP International Conference on Communications and Multimedia Security, CMS 2003, held in Torino, Italy in October 2003. The 21 revised full papers presented were carefully reviewed and selected for presentation. The papers are organized in topical sections on cryptography, network security, mobile and wireless network security, trust and privacy, application security, and multimedia security.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 268
- Erscheinungstermin: 12. Dezember 2003
- Englisch
- ISBN-13: 9783540451846
- Artikelnr.: 53146050
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 268
- Erscheinungstermin: 12. Dezember 2003
- Englisch
- ISBN-13: 9783540451846
- Artikelnr.: 53146050
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Antonio Lioy, Politecnico di Torino, Italy / Daniele Mazzocchi, Istituto Superiore Mario Boella, Torino, Italy
Cryptography.- Computation of Cryptographic Keys from Face Biometrics.- AUTHMAC_DH: A New Protocol for Authentication and Key Distribution.- Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection.- Network Security.- Securing the Border Gateway Protocol: A Status Update.- Towards an IPv6-Based Security Framework for Distributed Storage Resources.- Operational Characteristics of an Automated Intrusion Response System.- Mobile and Wireless Network Security.- A Secure Multimedia System in Emerging Wireless Home Networks.- Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents.- A Security Scheme for Mobile Agent Platforms in Large-Scale Systems.- Trust and Privacy.- Privacy and Trust in Distributed Networks.- Extending the SDSI / SPKI Model through Federation Webs.- Trust- : An XML Framework for Trust Negotiations.- Application Security.- How to Specify Security Services: A Practical Approach.- Application Level Smart Card Support through Networked Mobile Devices.- Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage.- Multimedia Security.- Selective Encryption of the JPEG2000 Bitstream.- Robust Spatial Data Hiding for Color Images.- Watermark Security via Secret Wavelet Packet Subband Structures.- A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression.- Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs.- Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization.
Cryptography.- Computation of Cryptographic Keys from Face Biometrics.- AUTHMAC_DH: A New Protocol for Authentication and Key Distribution.- Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection.- Network Security.- Securing the Border Gateway Protocol: A Status Update.- Towards an IPv6-Based Security Framework for Distributed Storage Resources.- Operational Characteristics of an Automated Intrusion Response System.- Mobile and Wireless Network Security.- A Secure Multimedia System in Emerging Wireless Home Networks.- Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents.- A Security Scheme for Mobile Agent Platforms in Large-Scale Systems.- Trust and Privacy.- Privacy and Trust in Distributed Networks.- Extending the SDSI / SPKI Model through Federation Webs.- Trust- : An XML Framework for Trust Negotiations.- Application Security.- How to Specify Security Services: A Practical Approach.- Application Level Smart Card Support through Networked Mobile Devices.- Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage.- Multimedia Security.- Selective Encryption of the JPEG2000 Bitstream.- Robust Spatial Data Hiding for Color Images.- Watermark Security via Secret Wavelet Packet Subband Structures.- A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression.- Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs.- Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization.







