Preface |
Conference Committees |
Web Security |
What You See Is What You Sign - Trustworthy Display of XML Documents for Signing and Verification / K. Scheibelhofer |
XML Electronic Signatures / G. Karlinger |
An integrated secure Web architecture for protected Mobile code distribution / M. Jalali-Sohi, et al. |
Secure and anonymous multicast framework / N. Weiler ; B. Plattner |
Vulnerabilities and Security Limitations of current IP Telephony Systems / R. Ackermann, et al. Watermarking I |
Quantization Watermarking in the JPEG2000 Coding Pipeline / P. Meerwald |
Theoretic Performance Analysis of a Watermarking System based on Bernoulli Chaotic Sequences / S. Tsekeridou, et al. |
Scalable Detection of Perceptual Watermarks in JPEG2000 Images / D. Simitopoulos, et al. |
Cryptographic Algorithms |
Collecting randomness from the net / B. Bencsath ; I. Vajda |
Encryption System Based on Neutral Network / C.-K. Chan, et al. |
A Modified Chaotic Cryptographic Method / W. Wong, et al. |
An Elliptic Curve Random Number Generator / I. Lee ; K. Wong |
Watermarking II |
Conditional and User Specific Access to Services and Resources Using Annotation Watermarks / J. Dittmann, et al. |
Large Scale distributed watermarking of multicast media through encryption / R. Parviainen ; P. Parnes |
Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept / S. Craver ; S. Katzenbeisser |
Fingerprints for Copyright Protection / S. Encheva |
System Security |
Software Security Assessment through Specification Mutations and Fault Injection / R. Kaksonen, et al. |
Asynchronous Large-Scale Certification Based on Certificate Verification Trees / J. Domingo-Ferrer, et al. |
ACLA: A Framework for Access Control List (ACL) Analysis and Optimization / J. Qian, et al. |
Transparent Access to Encrypted Data Using Operating System Network Stack Extensions / E. Rademer ; S.D. Wolthusen |
A PC Cryptographic Coprocessor Based on TI Signal Processor and Smart Card System / M. Markovic, et al. |
Watermarking III |
Optimization of Watermarking Performances Using Error Correcting Codes and Repetition / S. Zinger, et al. |
Using Raw Speech as a Watermark, does it work? / P. Nintanavongsa ; T. Amornraksa |
Multiple Security Aspects |
Transferability in Coin Systems with Observers / C. Fremdt ; H. Neumann |
Secure iLearning / F. Graf |
Tree-based Multicast Key Agreement / J. Schwenk, et al. |
Security for the core network of third generation mobile systems / G. Horn, et al. |
Secure Internet Phone / P. Horster, et al. |
Posters |
Secure Meeting Scheduling with AgenTa / T. Herlea, et al. |
Virtual Hidden Network / N. Shin |
Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval / R. Puertpan, et al. |
A Prepositioned Secret Sharing Scheme for Message Authentification in Broadcast Networks / A. Eskicioglu |
Secure Service Centered Networking for Nomadic Usage / M. Hollick |
Last Minute Papers |
A Secure Authentication Infrastructure for Mobile Communication Services over the Internet / I. Dupre la Tour, et al. |
Blind Compressed-Domain Watermarking for MPEG-encoded Videos / C.-L. Wu, et al. |
Index of Contributors |
Preface |
Conference Committees |
Web Security |
What You See Is What You Sign - Trustworthy Display of XML Documents for Signing and Verification / K. Scheibelhofer |
XML Electronic Signatures / G. Karlinger |
An integrated secure Web architecture for protected Mobile code distribution / M. Jalali-Sohi, et al. |