Communications and Multimedia Security. Advanced Techniques for Network and Data Protection 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings /

Communications and Multimedia Security. Advanced Techniques for Network and Data Protection 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings / [electronic resource] : edited by Antonio Lioy, Daniele Mazzocchi. - 1st ed. 2003. - VIII, 268 p. online resource. - Lecture Notes in Computer Science, 2828 1611-3349 ; . - Lecture Notes in Computer Science, 2828 .

Cryptography -- Computation of Cryptographic Keys from Face Biometrics -- AUTHMAC_DH: A New Protocol for Authentication and Key Distribution -- Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection -- Network Security -- Securing the Border Gateway Protocol: A Status Update -- Towards an IPv6-Based Security Framework for Distributed Storage Resources -- Operational Characteristics of an Automated Intrusion Response System -- Mobile and Wireless Network Security -- A Secure Multimedia System in Emerging Wireless Home Networks -- Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents -- A Security Scheme for Mobile Agent Platforms in Large-Scale Systems -- Trust and Privacy -- Privacy and Trust in Distributed Networks -- Extending the SDSI / SPKI Model through Federation Webs -- Trust- : An XML Framework for Trust Negotiations -- Application Security -- How to Specify Security Services: A Practical Approach -- Application Level Smart Card Support through Networked Mobile Devices -- Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage -- Multimedia Security -- Selective Encryption of the JPEG2000 Bitstream -- Robust Spatial Data Hiding for Color Images -- Watermark Security via Secret Wavelet Packet Subband Structures -- A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression -- Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs -- Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization.

9783540451846

10.1007/b13863 doi


Cryptography.
Data encryption (Computer science).
Computer networks .
Operating systems (Computers).
Multimedia systems.
Computers and civilization.
Electronic data processing--Management.
Cryptology.
Computer Communication Networks.
Operating Systems.
Multimedia Information Systems.
Computers and Society.
IT Operations.

QA268

005.824
© 2024 IIIT-Delhi, library@iiitd.ac.in