E-Book, Englisch, Band 175, 290 Seiten, eBook
Reihe: IFIP International Federation for Information Processing
Chadwick / Preneel Communications and Multimedia Security
2005
ISBN: 978-0-387-24486-0
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom
E-Book, Englisch, Band 175, 290 Seiten, eBook
Reihe: IFIP International Federation for Information Processing
ISBN: 978-0-387-24486-0
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Privacy/Anonymity.- Duo-Onions and Hydra-Onions — Failure and Adversary Resistant Onion Protocols.- Personal Attributes and Privacy.- Mobile Security 1.- Local Management of Credits and Debits in Mobile Ad Hoc Networks.- How Secure are Current Mobile Operating Systems?.- An Overview of Security Issues and Techniques in Mobile Agents.- Mobile Security 2.- A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography.- Mobile Trust Negotiation.- Weak Context Establishment Procedure for Mobility and Multi-Homing Management.- Security in Microsoft .Net.- A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components.- Threat Modelling for Web Services Based Web Applications.- Threat Modelling for ASP.NET.- Threat Modelling for SQL Servers.- Threat Modelling for Active Directory.- Threat Modelling for Security Tokens in Web Applications.- Cryptography.- Analysis of the DVB Common Scrambling Algorithm.- An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder.- Multimedia Security.- Robust Visual Hashing Using JPEG 2000.- A System for End-to-End Authentication of Adaptive Multimedia Content.- Application Level Security.- Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure.- Secure Role Based Messaging.- Five Non-Technical Pillars of Network Information Security Management.