close
1.

図書

図書
Antonio Lioy, Daniele Mazzocchi (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  viii, 263 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2828
所蔵情報: loading…
目次情報: 続きを見る
Cryptography
Computation of Cryptographic Keys from Face Biometrics / Alwyn Goh ; David C.L. Ngo
AUTHMAC DH: A New Protocol for Authentication and Key Distribution / Heba K. Aslan
Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection
Network Security
Securing the Border Gateway Protocol: A Status Update / Stephen T. Kent
Towards an IPv6-Based Security Framework for Distributed Storage Resources / Alessandro Bassi ; Julien Laganier
Operational Characteristics of an Automated Intrusion Response System / Maria Papadaki ; Steven Furnell ; Benn Lines ; Paul Reynolds
Mobile and Wireless Network Security
A Secure Multimedia System in Emerging Wireless Home Networks / Nut Taesombut ; Richard Huang ; Venkat P. Rangan
Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents / Yusuke Sakabe ; Masakazu Soshi ; Atsuko Miyaji
A Security Scheme for Mobile Agent Platforms in Large-Scale Systems / Michelle S. Wangham ; Joni da Silva Fraga ; Rafael R. Obelheiro
Trust and Privacy
Privacy and Trust in Distributed Networks / Thomas Rossler ; Arno Hollosi
Extending the SDSI / SPKI Model through Federation Webs / Altair Olivo Santin ; Carlos Maziero
Trust-X: An XML Framework for Trust Negotiations / Elisa Bertino ; Elena Ferrari ; Anna C. Squicciarini
Application Security
How to Specify Security Services: A Practical Approach / Javier Lopez ; Juan J. Ortega ; Jose Vivas ; Jose M. Troya
Application Level Smart Card Support through Networked Mobile Devices / Pierpaolo Baglietto ; Francesco Moggia ; Nicola Zingirian ; Massimo Maresca
Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage / Kuan W. Yip
Multimedia Security
Selective Encryption of the JPEG2000 Bitstream / Roland Norcen ; Andreas Uhl
Robust Spatial Data Hiding for Color Images / Xiaoqiang Li ; Xiangyang Xue ; Wei Li
Watermark Security via Secret Wavelet Packet Subband Structures / Werner Dietl
A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression / David Megias ; Jordi Herrera-Joancomarti ; Julià Minguillón
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs / G.S. Poh
Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization / Bubi G. Flepp-Stars ; Herbert Stogner
Author Index
Cryptography
Computation of Cryptographic Keys from Face Biometrics / Alwyn Goh ; David C.L. Ngo
AUTHMAC DH: A New Protocol for Authentication and Key Distribution / Heba K. Aslan
2.

図書

図書
Herbert Leitold, Evangelos Markatos (eds.)
出版情報: Berlin : Springer, c2006  xii, 251 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4237
所蔵情報: loading…
目次情報: 続きを見る
Advances in Network and Information Security
Computing of Trust in Ad-Hoc Networks / Huafei Zhu ; Feng Bao ; Jianwei Liu
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation / Spiros Antonatos ; Kostas G. Anagnostakis
On the Privacy Risks of Publishing Anonymized IP Network Traces / Dimitris Koukis
Secure Mobile Notifications of Civilians in Case of a Disaster / Heiko Rossnagel ; Tobias Scherner
A Fair Anonymous Submission and Review System / Vincent Naessens ; Liesje Demuynck ; Bart De Decker
Attribute Delegation Based on Ontologies and Context Information / Isaac Agudo ; Javier Lopez ; Jose A. Montenegro
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains / David W Chadwick ; Sassa Otenko ; Tuan Anh Nguyen
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange / Jeong Ok Kwon ; Kouichi Sakurai ; Dong Hoon Lee
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart / Elias Athanasopoulos
Perturbing and Protecting a Traceable Block Cipher / Julien Bringer ; Herve Chabanne ; Emmanuelle Dottax
A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors / Jorg Platte ; Raul Duran Diaz ; Edwin Naroska
Timed Release Cryptography from Bilinear Pairings Using Hash Chains / Konstantinos Chalkias ; George Stephanides
Compression of Encrypted Visual Data / Michael Gschwandtner ; Andreas Uhl ; Peter Wild
Selective Encryption for Hierarchical MPEG / Heinz Hofbauer ; Thomas Stutz
Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods / Xiangyang Luo ; Chunfang Yang ; Fenlin Liu
A Flexible and Open DRM Framework / Kristof Verslype
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies / Giannakis Antoniou ; Campbell Wilson ; Dimitris Geneiatakis
A Privacy Agent in Context-Aware Ubiquitous Computing Environments / Ni (Jenny) Zhang ; Chris Todd
Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems / Seng-Phil Hong ; Sungmin Kang
Attack Graph Based Evaluation of Network Security / Igor Kotenko ; Mikhail Stepashkin
Information Modeling for Automated Risk Analysis / Howard Chivers
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication / Andriy Panchenko ; Lexi Pimenidis
Author Index
Advances in Network and Information Security
Computing of Trust in Ad-Hoc Networks / Huafei Zhu ; Feng Bao ; Jianwei Liu
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation / Spiros Antonatos ; Kostas G. Anagnostakis
3.

図書

図書
Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.)
出版情報: Berlin : Springer, c2005  xiii, 360 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3677
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼