Communications and Multimedia Security (eBook, PDF)
10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings
Redaktion: Leitold, Herbert; Markatos, Evangelos
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Communications and Multimedia Security (eBook, PDF)
10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings
Redaktion: Leitold, Herbert; Markatos, Evangelos
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 10th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, CMS 2006, held in Heraklion, Crete, Greece in October 2006.
The 22 revised full papers presented were carefully reviewed and selected from 76 submissions.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 4.3MB
Andere Kunden interessierten sich auch für
- Secure Mobile Ad-hoc Networks and Sensors (eBook, PDF)40,95 €
- Security in Ad-hoc and Sensor Networks (eBook, PDF)40,95 €
- Security and Privacy in Ad-hoc and Sensor Networks (eBook, PDF)40,95 €
- Mobile Ad-hoc and Sensor Networks (eBook, PDF)73,95 €
- Communications and Multimedia Security (eBook, PDF)40,95 €
- Digital Rights Management (eBook, PDF)40,95 €
- Information Security Applications (eBook, PDF)40,95 €
-
-
-
This book constitutes the refereed proceedings of the 10th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, CMS 2006, held in Heraklion, Crete, Greece in October 2006.
The 22 revised full papers presented were carefully reviewed and selected from 76 submissions.
The 22 revised full papers presented were carefully reviewed and selected from 76 submissions.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 260
- Erscheinungstermin: 12. Oktober 2006
- Englisch
- ISBN-13: 9783540478232
- Artikelnr.: 44127016
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 260
- Erscheinungstermin: 12. Oktober 2006
- Englisch
- ISBN-13: 9783540478232
- Artikelnr.: 44127016
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Herbert Leitold, Secure Information Technology Center, Graz, Austria / Evangelos Markatos, Foundation of Research and Technology, Hellas, Crete, Greece
Computing of Trust in Ad-Hoc Networks.- TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation.- On the Privacy Risks of Publishing Anonymized IP Network Traces.- Secure Mobile Notifications of Civilians in Case of a Disaster.- A Fair Anonymous Submission and Review System.- Attribute Delegation Based on Ontologies and Context Information.- Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains.- One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange.- Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart.- Perturbing and Protecting a Traceable Block Cipher.- A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors.- Timed Release Cryptography from Bilinear Pairings Using Hash Chains.- Compression of Encrypted Visual Data.- Selective Encryption for Hierarchical MPEG.- Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods.- A Flexible and Open DRM Framework.- PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies.- A Privacy Agent in Context-Aware Ubiquitous Computing Environments.- Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems.- Attack Graph Based Evaluation of Network Security.- Information Modeling for Automated Risk Analysis.- Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.
Computing of Trust in Ad-Hoc Networks.- TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation.- On the Privacy Risks of Publishing Anonymized IP Network Traces.- Secure Mobile Notifications of Civilians in Case of a Disaster.- A Fair Anonymous Submission and Review System.- Attribute Delegation Based on Ontologies and Context Information.- Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains.- One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange.- Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart.- Perturbing and Protecting a Traceable Block Cipher.- A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors.- Timed Release Cryptography from Bilinear Pairings Using Hash Chains.- Compression of Encrypted Visual Data.- Selective Encryption for Hierarchical MPEG.- Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods.- A Flexible and Open DRM Framework.- PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies.- A Privacy Agent in Context-Aware Ubiquitous Computing Environments.- Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems.- Attack Graph Based Evaluation of Network Security.- Information Modeling for Automated Risk Analysis.- Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.