Cryptography |
Computation of Cryptographic Keys from Face Biometrics / Alwyn Goh ; David C.L. Ngo |
AUTHMAC DH: A New Protocol for Authentication and Key Distribution / Heba K. Aslan |
Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection |
Network Security |
Securing the Border Gateway Protocol: A Status Update / Stephen T. Kent |
Towards an IPv6-Based Security Framework for Distributed Storage Resources / Alessandro Bassi ; Julien Laganier |
Operational Characteristics of an Automated Intrusion Response System / Maria Papadaki ; Steven Furnell ; Benn Lines ; Paul Reynolds |
Mobile and Wireless Network Security |
A Secure Multimedia System in Emerging Wireless Home Networks / Nut Taesombut ; Richard Huang ; Venkat P. Rangan |
Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents / Yusuke Sakabe ; Masakazu Soshi ; Atsuko Miyaji |
A Security Scheme for Mobile Agent Platforms in Large-Scale Systems / Michelle S. Wangham ; Joni da Silva Fraga ; Rafael R. Obelheiro |
Trust and Privacy |
Privacy and Trust in Distributed Networks / Thomas Rossler ; Arno Hollosi |
Extending the SDSI / SPKI Model through Federation Webs / Altair Olivo Santin ; Carlos Maziero |
Trust-X: An XML Framework for Trust Negotiations / Elisa Bertino ; Elena Ferrari ; Anna C. Squicciarini |
Application Security |
How to Specify Security Services: A Practical Approach / Javier Lopez ; Juan J. Ortega ; Jose Vivas ; Jose M. Troya |
Application Level Smart Card Support through Networked Mobile Devices / Pierpaolo Baglietto ; Francesco Moggia ; Nicola Zingirian ; Massimo Maresca |
Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage / Kuan W. Yip |
Multimedia Security |
Selective Encryption of the JPEG2000 Bitstream / Roland Norcen ; Andreas Uhl |
Robust Spatial Data Hiding for Color Images / Xiaoqiang Li ; Xiangyang Xue ; Wei Li |
Watermark Security via Secret Wavelet Packet Subband Structures / Werner Dietl |
A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression / David Megias ; Jordi Herrera-Joancomarti ; Julià Minguillón |
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs / G.S. Poh |
Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization / Bubi G. Flepp-Stars ; Herbert Stogner |
Author Index |
Cryptography |
Computation of Cryptographic Keys from Face Biometrics / Alwyn Goh ; David C.L. Ngo |
AUTHMAC DH: A New Protocol for Authentication and Key Distribution / Heba K. Aslan |