Coverart for item
The Resource Communications and Multimedia Security : 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 – June 2, 2010. Proceedings, edited by Bart Decker, Ingrid Schaumüller-Bichl, (electronic resource)

Communications and Multimedia Security : 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 – June 2, 2010. Proceedings, edited by Bart Decker, Ingrid Schaumüller-Bichl, (electronic resource)

Label
Communications and Multimedia Security : 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 – June 2, 2010. Proceedings
Title
Communications and Multimedia Security
Title remainder
11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 – June 2, 2010. Proceedings
Statement of responsibility
edited by Bart Decker, Ingrid Schaumüller-Bichl
Creator
Contributor
Editor
Provider
Subject
Language
eng
Summary
This book constitutes the refereed proceedings of the 11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2006, held in Linz, Austria, in May/June 2010. The 23 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on WiFi and RF security; XML and web services security; watermarking and multimedia security; analysis and detection of malicious code and risk management; VoIP security; biometrics; applied cryptography; and secure communications
Member of
http://library.link/vocab/creatorName
Decker, Bart
Image bit depth
0
LC call number
TK5105.5-5105.9
Literary form
non fiction
http://library.link/vocab/relatedWorkOrContributorName
  • Schaumüller-Bichl, Ingrid.
  • SpringerLink
Series statement
Lecture Notes in Computer Science,
Series volume
6109
http://library.link/vocab/subjectName
  • Computer science
  • Computer Communication Networks
  • Operating systems (Computers)
  • Data encryption (Computer science)
  • Computer software
  • Information Systems
  • Computer Science
  • Computer Communication Networks
  • Data Encryption
  • Management of Computing and Information Systems
  • Algorithm Analysis and Problem Complexity
  • Computers and Society
  • Operating Systems
Label
Communications and Multimedia Security : 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 – June 2, 2010. Proceedings, edited by Bart Decker, Ingrid Schaumüller-Bichl, (electronic resource)
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Keynotes -- Keynotes -- WiFi and RF Security -- A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks -- Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion -- XML and Web Services Security -- Throwing a MonkeyWrench into Web Attackers Plans -- Security in OpenSocial-Instrumented Social Networking Services -- Security for XML Data Binding -- Watermarking and Multimedia Security -- Watermark Detection for Video Bookmarking Using Mobile Phone Camera -- Watermark-Based Authentication and Key Exchange in Teleconferencing Systems -- Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking -- Analysis and Detection of Malicious Code and Risk Management -- Statistical Detection of Malicious PE-Executables for Fast Offline Analysis -- A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC) -- Business and IT Continuity Benchmarking -- VoIP Security -- Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks -- SIP Proxies: New Reflectors in the Internet -- Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal -- Biometrics -- Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication -- Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction -- Privacy Preserving Key Generation for Iris Biometrics -- Applied Cryptography -- Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare -- Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption -- Detecting Hidden Encrypted Volumes -- Secure Communications -- Tor HTTP Usage and Information Leakage -- Secure Communication Using Identity Based Encryption -- Anonymous Client Authentication for Transport Layer Security
Dimensions
unknown
Extent
XIII, 281p. 74 illus.
File format
multiple file formats
Form of item
electronic
Isbn
9783642132414
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-642-13241-4
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-642-13241-4
Label
Communications and Multimedia Security : 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 – June 2, 2010. Proceedings, edited by Bart Decker, Ingrid Schaumüller-Bichl, (electronic resource)
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Keynotes -- Keynotes -- WiFi and RF Security -- A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks -- Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion -- XML and Web Services Security -- Throwing a MonkeyWrench into Web Attackers Plans -- Security in OpenSocial-Instrumented Social Networking Services -- Security for XML Data Binding -- Watermarking and Multimedia Security -- Watermark Detection for Video Bookmarking Using Mobile Phone Camera -- Watermark-Based Authentication and Key Exchange in Teleconferencing Systems -- Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking -- Analysis and Detection of Malicious Code and Risk Management -- Statistical Detection of Malicious PE-Executables for Fast Offline Analysis -- A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC) -- Business and IT Continuity Benchmarking -- VoIP Security -- Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks -- SIP Proxies: New Reflectors in the Internet -- Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal -- Biometrics -- Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication -- Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction -- Privacy Preserving Key Generation for Iris Biometrics -- Applied Cryptography -- Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare -- Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption -- Detecting Hidden Encrypted Volumes -- Secure Communications -- Tor HTTP Usage and Information Leakage -- Secure Communication Using Identity Based Encryption -- Anonymous Client Authentication for Transport Layer Security
Dimensions
unknown
Extent
XIII, 281p. 74 illus.
File format
multiple file formats
Form of item
electronic
Isbn
9783642132414
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-642-13241-4
Other physical details
online resource.
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(DE-He213)978-3-642-13241-4

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...