Advanced Communications and Multimedia Security IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26–27, 2002, Portorož, Slovenia / edited by Borka Jerman-Blazic, Tomaz Klobucar.

Advanced Communications and Multimedia Security presents a state-of-the-art review of current perspectives as well as the latest developments in the area of communications and multimedia security. It examines requirements, issues and solutions pertinent to securing information networks, and identifi...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Jerman-Blazic, Borka (Editor), Klobucar, Tomaz (Editor)
Format: eBook
Language:English
Published: New York, NY : Springer US : Imprint: Springer, 2002.
Edition:1st ed. 2002.
Series:IFIP Advances in Information and Communication Technology, 100
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • On the Security of a Structural Proven Signer Ordering Multisignature Scheme
  • Renewing Cryptographic Timestamps
  • Implementing Elliptic Curve Cryptography
  • A New Asymmetric Fingerprinting Framework Based on Secret Sharing
  • Authentication of Transit Flows and K-Siblings One-Time Signature
  • Improving the Functionality of Syn Cookies
  • A Mac-Layer Security Architecture for Cable Networks
  • Towards Authentication Using Mobile Devices
  • Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks
  • Enabling Adaptive and Secure Extranets
  • Multiple Layer Encryption for Multicast Groups
  • Access Control, Reverse Access Control and Replication Control in a World Wide Distributed System
  • The Coras Approach for Model-Based Risk Management Applied to E-Commerce Domain
  • Towards Security Architecture for Future Active Ip Networks
  • Combined Fingerprinting Attacks Against Digital Audio Watermarking: Methods, Results and Solutions
  • Selective Encryption of Visual Data
  • Biometric Authentication — Security and Usability
  • Automatic Authentication Based on the Austrian Citizen Card
  • An Open Interface Enabling Secure E-Government
  • Cadenus Security Considerations
  • Validation of Long-Term Signatures
  • Digital Signatures and Electronic Documents: A Cautionary Tale.