close
1.

図書

図書
Burton S. Kaliski, Jr., Çetin K. Koç, Christof Paar (eds.)
出版情報: Berlin ; Tokyo : Springer, c2002  xiv, 612 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2523
所蔵情報: loading…
2.

図書

図書
Maritta Heisel, Peter Liggesmeyer, Stefan Wittmann (eds.)
出版情報: Berlin : Springer, c2004  xi, 337 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3219
所蔵情報: loading…
目次情報: 続きを見る
Invited Talk
Why Safety and Security Should and Will Merge / A. Pfitzmann
Safety Cases
The Deconstruction of Safety Arguments Through Adversarial Counter-Argument / J.M. Armstrong ; S.E. Paynter
Using Fuzzy Self-Organising Maps for Safety Critical Systems / Z. Kurd ; T.P. Kelly
Using Formal Methods in a Retrospective Safety Case / L.-H. Eriksson
Reliability
A Highly Fault Detectable Cache Architecture for Dependable Computing / H.R. Zarandi ; S.G. Miremadi
An Empirical Exploration of the Difficulty Function / J.G.W. Bentley ; P.G. Bishop ; M. van der Meulen
Towards the Integration of Fault, Resource, and Power Management / T. Saridakis
Human Factors
Modeling Concepts for Safety-Related Requirements in Sociotechnical Systems / M. Cebulla
Analysing Mode Confusion: An Approach Using FDR2 / B. Buth
Handling Safety Critical Requirements in System Engineering Using the B Formal Method / D. Essame
Transportation
A Hybrid Testing Methodology for Railway Control Systems / G. De Nicola ; P. di Tommaso ; R. Esposito ; F. Flammini ; A. Orazzo
Actuator Based Hazard Analysis for Safety Critical Systems / P. Johannessen ; F. Torner ; J. Torin
Performability Measures of the Public Mobile Network of a Tele Control System / E. Ciancamerla ; M. Minichino
Software Development
PLC-Based Safety Critical Software Development for Nuclear Power Plants / J. Yoo ; S. Cha ; H.S. Son ; C.H. Kim ; J.-S. Lee
Compositional Hazard Analysis of UML Component and Deployment Models / H. Giese ; M. Tichy ; D. Schilling
Automatic Test Data Generation from Embedded C Code / E. Dillon ; C. Meudec
Fault Tree Analysis
State-Event-Fault-Trees - A Safety Analysis Model for Software Controlled Systems / B. Kaiser ; C. Gramlich
Safety Requirements and Fault Trees Using Retrenchment / R. Banach ; R. Cross
The Effects on Reliability of Integration of Aircraft Systems Based on Integrated Modular Avionics / D. Rehage ; U.B. Carl ; M. Merkel ; A. Vahl
Automotive Telematics - Road Safety Versus IT Security? / R.G. Herrtwich
Formal Methods and Systems
Modular Formal Analysis of the Central Guardian in the Time-Triggered Architecture / H. Pfeifer ; F.W. von Henke
Refinement of Fault Tolerant Control Systems in B / L. Laibinis ; E. Troubitsyna
Numerical Integration of PDEs for Safety Critical Applications Implemented by I&C Systems / M. Vollmer
Security and Quality of Service
An Integrated View of Security Analysis and Performance Evaluation: Trading QoS with Covert Channel Bandwidth / A. Aldini ; M. Bernardo
Dependability Benchmarking of Web-Servers / J. Duraes ; M. Vieira ; H. Madeira
Hazard and Risk Analysis
An Approach for Model-Based Risk Assessment / B.A. Gran ; R. Fredriksen ; A.P.-J. Thunem
How Explicit Are the Barriers to Failure in Safety Arguments? / S.P. Smith ; M.D. Harrison ; B.A. Schupp
Author Index
Invited Talk
Why Safety and Security Should and Will Merge / A. Pfitzmann
Safety Cases
3.

図書

図書
Kan Zhang, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c2004  xii, 442 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3225
所蔵情報: loading…
目次情報: 続きを見る
Key Management
Practical Authenticated Key Agreement Using Passwords / Taekyoung Kwon
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks / Muxiang Zhang
Storage-Efficient Stateless Group Key Revocation / Pan Wang ; Peng Ning ; Douglas S. Reeves
Digital Signatures
Low-Level Ideal Signatures and General Integrity Idealization / Michael Backes ; Birgit Pfitzmann ; Michael Waidner
Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA / Julien Cathalo ; Benoît Libert ; Jean-Jacques Quisquater
How to Break and Repair a Universally Composable Signature Functionality / Dennis Hofheinz
New Algorithms
RSA Accumulator Based Broadcast Encryption / Craig Gentry ; Zulfikar Ramzan
Chameleon Hashing Without Key Exposure / Xiaofeng Chen ; Fangguo Zhang ; Kwangjo Kim
Radix-r Non-Adjacent Form / Tsuyoshi Takagi ; Sung-Ming Yen ; Bo-Ching Wu
Cryptanalysis
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor / Raphael C.-W. Phan ; Helena Handschuh
Security Analysis of Two Signcryption Schemes / Guilin Wang ; Robert H. Deng ; DongJin Kwak ; SangJae Moon
On The Security of Key Derivation Functions / Carlisle Adams ; Guenther Kramer ; Serge Mister ; Robert Zuccherato
Intrusion Detection
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery / Hai Wang ; Peng Liu ; Lunqun Li
A Model for the Semantics of Attack Signatures in Misuse Detection Systems / Michael Meier
Detection of Sniffers in an Ethernet Network / Zouheir Trabelsi ; Hamza Rahmani
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks / Mark Foster ; Joseph N. Wilson ; Shigang Chen
Securing DBMS: Characterizing and Detecting Query Floods / Elisa Bertino ; Teodoro Leggieri ; Evimaria Terzi
Access Control
An XML-Based Approach to Document Flow Verification / Elena Ferrari ; Giovanni Mella
Model-Checking Access Control Policies / Dimitar P. Guelev ; Mark Ryan ; Pierre Yves Schobbens
A Distributed High Assurance Reference Monitor / Ajay Chander ; Drew Dean ; John Mitchell
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control / D. Nali ; C. Adams ; A. Miri
Human Authentication
Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security) / Richard Bergmair ; Stefan Katzenbeisser
Image Recognition CAPTCHAs / Monica Chew ; J.D. Tygar
Certificate Management
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model / Zhengyi Le ; Yi Ouyang ; James Ford ; Fillia Makedon
Certificate Recommendations to Improve the Robustness of Web of Trust / Qinglin Jiang
Mobile and Ad Hoc Security
Universally Composable Secure Mobile Agent Computation / Ke Xu ; Stephen R. Tate
Re-thinking Security in IP Based Micro-Mobility / Jukka Ylitalo ; Jan Melén ; Pekka Nikander ; Vesa Torvinen
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group / Qianhong Wu ; Changjie Wang ; Yumin Wang
Web Security
Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions / HongQian Karen Lu ; Asad Ali
Provable Unlinkability Against Traffic Analysis Already After <$>{\cal O}<$>(log(n)) Steps! / Marcin Gomułkiewicz ; Marek Klonowski ; Mirosław Kutyłowski
An Efficient Online Electronic Cash with Unlinkable Exact Payments / Toru Nakanishi ; Mitsuaki Shiota ; Yuji Sugiyama
Digital Rights Management
Modifiable Digital Content Protection in P2P / Heejae Park ; Jong Kim
Survey on the Technological Aspects of Digital Rights Management / William Ku ; Chi-Hung Chi
Detecting Software Theft via Whole Program Path Birthmarks / Ginger Myles ; Christian Collberg
Software Security
Effective Security Requirements Analysis: HAZOP and Use Cases / Thitima Srivatanakul ; John A. Clark ; Fiona Polack
The Obfuscation Executive / Kelly Heffner
Author Index
Key Management
Practical Authenticated Key Agreement Using Passwords / Taekyoung Kwon
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks / Muxiang Zhang
4.

図書

図書
Howard Heys, Carlisle Adams (eds.)
出版情報: Berlin : Springer, c2000  viii, 241 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1758
所蔵情報: loading…
5.

図書

図書
Andreas Pfitzmann (ed.)
出版情報: Berlin : Springer, c2000  ix, 492 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1768
所蔵情報: loading…
目次情報: 続きを見る
Fundamentals of Steganography
An Information-Theoretic Approach to Steganography and Watermarking / Thomas Mittelholzer
One-Time Hash Steganography / Natori Shin
Steganography: Paradigms and Examples
Steganography Secure against Cover-Stego-Attacks / Elke Franz ; Andreas Pfitzmann
Secure Steganographic Methods for Palette Images / Jiri Fridrich ; Rui Du
Attacks on Steganographic Systems / Andreas Westfeld
Beyond Symmetric Steganography
Developments in Steganography / Joshua R. Smith ; Chris Dodge
An Asymmetric Public Detection Watermarking Technique / Teddy Furon ; Pierre Duhamel
Zero Knowledge Watermark Detection / Scott Craver
Watermarking: Proving Ownership
Proving Ownership of Digital Content / André Adelsbach ; Birgit Pfitzmann ; Ahmad-Reza Sadeghi
Error- and Collusion-Secure Fingerprinting for Digital Data / Hans-Jürgen Guth
Watermarking: Detection and Decoding
Computing the Probability of False Watermark Detection / Matt L. Miller ; Jeffrey A. Bloom
Optimum Decoding of Non-additive Full Frame DFT Watermarks / Alessia De Rosa ; Mauro Barni ; Franco Bartolini ; Vito Cappellini ; Alessandro Piva
Watermark Detection after Quantization Attacks / Joachim J. Eggers ; Bernd Girod
Content-Based Watermarking for Image Authentication / Pedro Lamy ; José Martinho ; Tiago Rosa ; Maria Paula Queluz
Watermarking: Embedding Techniques
Fast Robust Template Matching for Affine Resistant Image Watermarks / Shelby Pereira ; Thierry Pun
A Stochastic Approach to Content Adaptive Digital Image Watermarking / Sviatoslav Voloshynovskiy ; Alexander Herrigel ; Nazanin Baumgaertner
Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation / Martin Kutter
Watermarking: New Designs and Applications
On the Design of a Watermarking System: Considerations and Rationales / Jean-Paul Linnartz ; Geert Depovere ; Ton Kalker
A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking / Gabriella Csurka ; Frédéric Deguillaume ; Joseph J. K. Ó Ruanaidh
Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware / John Lach ; William H. Mangione-Smith ; Miodrag Potkonjak
Watermarking: Improving Robustness
Robust Watermarking for Images Based on Color Manipulation / Sebastiano Battiato ; Dario Catalano ; Giovanni Gallo ; Rosario Gennaro
Recovery of Watermarks from Distorted Images / Neil F. Johnson ; Zoran Duric ; Sushil Jajodia
Cocktail Watermarking on Images / Chun-Shien Lu ; Hong-Yuan Mark Liao ; Shih-Kun Huang ; Chwen-Jye Sze
Watermarking and Software Protection
Hiding Signatures in Graph Coloring Solutions / Gang Qu
Robust Object Watermarking: Application to Code / Julien P. Stern ; Gaël Hachez ; François Koeune ; Jean-Jacques Quisquater
Software DisEngineering: Program Hiding Architecture and Experiments / Enriquillo Valdez ; Moti Yung
The Difficulty of Separating Private and Public Information
Chaffing at the Bit: Thoughts on a Note by Ronald Rivest / John McHugh
An Entropy-Based Framework for Database Inference / Ira S. Moskowitz ; LiWu Chang
Covert Information Transmission through the Use of Standard Collision Resolution Algorithms / Talat Mert DoGu ; Anthony Ephremides
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast / Frank Stajano ; Ross Anderson
Stego-Engineering
Protecting Secret Keys in a Compromised Computational System / W. P. R. Mitchell
StegFS: A Steganographic File System for Linux / Andrew D. McDonald ; Markus G. Kuhn
Nonbinary Audio Cryptography / Yvo Desmedt ; Tri V. Le
Author Index
Fundamentals of Steganography
An Information-Theoretic Approach to Steganography and Watermarking / Thomas Mittelholzer
One-Time Hash Steganography / Natori Shin
6.

図書

図書
Hideki Imai, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c2000  xi, 483 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1751
所蔵情報: loading…
目次情報: 続きを見る
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol / Wen-Guey Tzeng
An Efficient NICE-Schnorr-Type Signature Scheme / Detlef Huhnlein ; Johannes Merkle
Identification of Bad Signatures in Batches / Jaros$law Pastuszak ; Dariusz Michalek ; Josef Pieprzyk ; Jennifer Seberry
Some Remarks on a Fair Exchange Protocol / Jianying Zhou ; Robert Deng ; Feng Bao
An Identification Scheme Based on Sparse Polynomials / Seigo Arita ; William D. Banks ; Daniel Lieman ; Igor E. Shparlinski
A State-Based Model for Certificate Management Systems / Chuchang Liu ; Maris A. Ozols ; Marie Henderson ; Tony Cant
Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence / Reto Kohlas ; Ueli Maurer
The Composite Discrete Logarithm and Secure Authentication / David Pointcheval
Chosen-Ciphertext Security for Any One-Way Cryptosystem
Short Proofs of Knowledge for Factoring / Guillaume Poupard ; Jacques Stern
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms / X.Y.Wang ; L.C.Hui ; K.P.Chow ; W.W.Tsang ; C.F.Chong ; H.W.Chan
All-or-Nothing Transform and Remotely Keyed Encryption Protocols / Sang Uk Shin ; Weon Shin ; Kyung Hyune Rhee
Security of Public Key Certificate Based Authentication Protocols / Wu Wen ; Takamichi Saito ; Fumio Mizoguchi
Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2 / Tetsuya Izu ; Jun Kogure ; Kazuhiro Yokoyama
Key Recovery in Third Generation Wireless Communication Systems / Juanma González Nieto ; DongGook Park ; Colin Boyd ; Ed Dawson
Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications / Katsuyuki Okeya ; Hiroyuki Kurumatani ; Kouichi Sakurai
Certificates of Recoverability with Scalable Recovery Agent Security / Eric R. Verheul
Design Validations for Discrete Logarithm Based Signature Schemes / Ernest Brickell ; Serge Vaudenay ; Moti Yung
Optimally Efficient Accountable Time-Stamping / Ahto Buldas ; HelgerLipmaa ; Berry Schoenmakers
"Pseudorandom Intermixing": A Tool for Shared Cryptography / YairFankel ; Philip MacKenzie
RSA-Based Auto-recoverable Cryptosystems / Adam Young
Efficient and Fresh Certification / Irene Gassko ; Peter S. Gemmell
Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions / Ronald Cramer ; ard
Cryptographic Approaches to Privacy in Forensic DNA Databases / Philip Bohannon ; Markus Jakobsson ; Sukamol Srikwan
Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes / Toru Inoue
An Auction Protocol Which Hides Bids of Losers / Chae Hoon Lim ; Hyo Sun Hwang ; Kazue Sako
Forward Secrecy and Its Application to Future Mobile Communications Security / Sang-Jae Moon
Selecting Cryptographic Key Sizes / Arjen K. Lenstra
A Structured ElGamal-Type Multisignature Scheme / Mike Burmester ; Yvo Desmedt ; Hiroshi Doi ; Masahiro Mambo ; Eiji Okamoto ; Mitsuru Tada ; Yuko Yoshifuji
Author Index
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol / Wen-Guey Tzeng
An Efficient NICE-Schnorr-Type Signature Scheme / Detlef Huhnlein ; Johannes Merkle
Identification of Bad Signatures in Batches / Jaros$law Pastuszak ; Dariusz Michalek ; Josef Pieprzyk ; Jennifer Seberry
7.

図書

図書
Bruce Christianson ... [et al.](eds.)
出版情報: Berlin : Springer, c2000  xii, 227 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1796
所蔵情報: loading…
8.

図書

図書
Ed Dawson, Andrew Clark, Colin Boyd (eds.)
出版情報: Berlin : Springer, c2000  xii, 488 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1841
所蔵情報: loading…
9.

図書

図書
Mihir Bellare (ed.)
出版情報: Berlin : Springer, c2000  xi, 543 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1880
所蔵情報: loading…
目次情報: 続きを見る
XTR and NTRU
The XTR Pubhc Key System / Arjen K. Lenstra ; Eric R. Verheul
A Chosen-Ciphertext Attack against NTRU / Eliane Jaulmes ; Antoine Joux
Privacy for Databases
Privacy Preserving Data Mining / Yehuda Lindell ; Benny Pinkas
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing / Arnos Beimel ; Yuval Ishai ; Tal Malkin
Secure Distributed Computation and Applications
Parallel Reducibility for Information-Theoretically Secure Computation / Yevgeniy Dodis ; Silvio Micali
Optimistic Fair Secure Computation / Christian Cachin ; Jan Camenisch
A Cryptographic Solution to a Game Theoretic Problem / Shai Halevi ; Tal Rahin
Algebraic Cryptosystems
Differential Fault Attacks on Elliptic Curve Cryptosystems / Ingrid Bichl ; Bernd Meyer ; Volker Müller
Quantum Public-Key Cryptosystems / Tatsuaki Okamoto ; Keisuke Tanaka ; Shigenori Uchiyama
New Public-Key Cryptosystem Using Braid Groups / Ki Hyoung Ko ; Sang Jin Lee ; Jung Hee Cheon ; Jae Woo Han ; Ju-sung Kang ; Choonsik Park
Message Authentication
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm / Don Coppersmith ; Lars R. Knudsen ; Chris J. Mitchell
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions / John Black ; Phillip Rogaway
L-colhsion Attacks against Randomized MACs / Michael Semanko
Digital Signatures
On the Exact Security of Full Domain Hash / Jean-Sébastien Coron
Timed Commitments / Dan Boneh ; Moni Naor
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme / Giuseppe Ateniese ; Marc Joye ; Gene Tsudik
Provably Secure Partially Blind Signatures / Masayuki Abe
Cryptanalysis
Weaknesses in the SL2(<$>{\rm IF}_{2^n}<$>) Hashing Scheme / Rainer Steinwandt ; Markus Grassl ; Willi Geiselmann ; Thomas Beth
Fast Correlation Attacks through Reconstruction of Linear Polynomials / Thomas Johansson ; Fredrik Jönsson
Traitor Tracing and Broadcast Encryption
Sequential Traitor Tracing / Reihaneh Safavi-Naini ; Yejing Wang
Long-Lived Broadcast Encryption / Juan A. Garay ; Jessica Staddon ; Avishai Wool
Invited Talk
Taming the Adversary / Martín Abadi
Symmetrie Encryption
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search / Anand Desai
On the Round Security of Symmetrie-Key Cryptographic Primitives / Zulfikar Ramzan ; Leonid Reyzin
New Paradigms for Constructing Symmetrie Encryption Schemes Secureagainst Chosen-Ciphertext Attack
To Commit or Not to Commit
Efficient Non-malleable Commitment Schemes / Marc Fischlin ; Roger Fischlin
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption / Ivan Damgård ; Jesper Buus Nielsen
Protocols
A Note on the Round-Complexity of Concurrent Zero-Knowledge / Alan Rosen
An Improved Pseudo-random Generator Based on Discrete Log / Rosario Gennaro
Linking Classical and Quantum Key Agreement: Is There ``Bound Information''? / Nicolas Gisin ; Stefan Wolf
Stream Ciphers and Boolean Functions
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers / Muxiang Zhang ; Agnes Chan
Nonlinearity Bounds and Constructions of Resilient Boolean Functions / Palash Sarkar ; Subhamoy Maitra
Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications / Jürgen Bierbrauer ; Holger Schellwat
Author Index
XTR and NTRU
The XTR Pubhc Key System / Arjen K. Lenstra ; Eric R. Verheul
A Chosen-Ciphertext Attack against NTRU / Eliane Jaulmes ; Antoine Joux
10.

図書

図書
Ira S. Moskowitz (ed.)
出版情報: Berlin : Springer, c2001  viii, 412 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2137
所蔵情報: loading…
目次情報: 続きを見る
Trustworthy Paper Documents / Marshall Bern ; Jeff Breidenbach ; David Goldberg
An Implementation of Key-Based Digital Signal Steganography / Toby Sharp
Distortion-Free Data Embedding for Images / Miroslav Goljan ; Jessica J. Fridrich ; Rui Du
Information Hiding through Noisy Channels / Valeri Korjik ; Guillermo Morales-Luna
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding / M. Kivanç Mihçak ; Ramarathnam Venkatesan
Computational Forensic Techniques for Intellectual Property Protection / Jennifer L. Wong ; Darko Kirovski ; Miodrag Potkonjak
Intellectual Property Metering / Farinaz Koushanfar ; Gang Qu
Keyless Public Watermarking for Intellectual Property Authentication
Efficiency Improvements of the Private Message Service / Oliver Berthold ; Sebastian Clauß ; Stefan Köpsell ; Andreas Pfitzmann
A Reputation System to Increase MIX-Net Reliability / Roger Dingledine ; Michael J. Freedman ; David Hopwood ; David Molnar
Neural Networks Functions for Public Key Watermarking / Justin Picard ; Arnaud Robert
A Graph Theoretic Approach to Software Watermarking / Vijay Vazirani ; Saurabh Sinha
COiN-Video: A Model for the Dissemination of Copyrighted Video Streams over Open Networks / Dimitris Thanos
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation / Mikhail J. Atallah ; Victor Raskin ; Michael Crogan ; Christian Hempelmann ; Florian Kerschbaum ; Dina Mohamed ; Sanket Naik
Digital Watermarking of Chemical Structure Sets / Joachim J. Eggers ; Wolf-Dietrich Ihlenfeldt ; Bernd Girod
The Strong Eternity Service / Tonda BeneÜ
Real World Patterns of Failure in Anonymity Systems / Richard Clayton ; George Danezis ; Markus G. Kuhn
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems / Adam Back ; Ulf Möller ; Anton Stiglic
Automatic Detection of a Watermarked Document Using a Private Key / Julien P. Stern ; Jean-Pierre Tillich
Zero-Knowledge Watermark Detection and Proof of Ownership / André Adelsbach ; Ahmad-Reza Sadeghi
F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis / Andreas Westfeld
A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience / Hirofumi Muratani
Practical Capacity of Digital Watermarks / Ryo Sugihara
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking / Sviatoslav Voloshynovskiy ; Alexander Herrigel ; Thierry Pun
Second Generation Benchmarking and Application Oriented Evaluation / Shelby Pereira ; Maribel Madueno ; Stéphan Marchand-Maillet
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum / Henrique Malvar
Hiding Association Rules by Using Confidence and Support / Elena Dasseni ; Vassilios S. Verykios ; Ahmed K. Elmagarmid ; Elisa Bertino
How to Break a Semi-anonymous Fingerprinting Scheme
An Analysis of One of the SDMI Candidates / Julien Boeuf
Author Index
Trustworthy Paper Documents / Marshall Bern ; Jeff Breidenbach ; David Goldberg
An Implementation of Key-Based Digital Signal Steganography / Toby Sharp
Distortion-Free Data Embedding for Images / Miroslav Goljan ; Jessica J. Fridrich ; Rui Du
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼