


default search action
6th Communications and Multimedia Security 2002: Portoroz, Slovenia
- Borka Jerman-Blazic, Tomaz Klobucar:

Advanced Communications and Multimedia Security, IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia. IFIP Conference Proceedings 228, Kluwer 2002, ISBN 978-1-4020-7206-2
Applied Cryptography
- Chris J. Mitchell

, Namhyun Hur:
On the security of a structural proven signer ordering multisignature scheme. 1-8 - Sattam S. Al-Riyami, Chris J. Mitchell

:
Renewing crytographic timestamps. 9-16 - Wolfgang Bauer:

Implementing elliptic curve cryptography. 17-28 - Yan Wang, Shuwang Lü, Zhenhua Liu:

A new asymmetric fingerprinting framework based on secret sharing. 29-40 - Mohamed Al-Ibrahim

, Josef Pieprzyk:
Authentication of transit flows and k-siblings one-time signature. 41-55
Communications Security
- Andre Zuquete

:
Improving the functionality of syn cookies. 57-77 - Tadauchi Masaharu, Ishii Tatsuei, Itoh Susumu:

A mac-layer security architecture for cable networks. 79-90 - Edgar R. Weippl, Wolfgang Eßmayr, F. Gruber, W. Stockner, T. Trenker:

Towards authentication using mobile devices. 91-105 - Pietro Michiardi, Refik Molva:

Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. 107-121 - Yves Roudier, Olivier Fouache, Pierre Vannel, Refik Molva:

Enabling adaptive and secure extranets. 123-135 - Alain Pannetrat, Refik Molva:

Multiple layer encryption for multicast groups. 137-153
Distributed Systems Security
- Bogdan C. Popescu, Chandana Gamage, Andrew S. Tanenbaum:

Access control, reverse access control and replication control in a world wide distributed system. 155-167 - Dimitris Raptis, Theodosis Dimitrakos, Bjørn Axel Gran, Ketil Stølen:

The coras approach for model-based risk management applied to e-commerce domain. 169-181 - Dusan Gabrijelcic, Arso Savanovic, Borka Jerman-Blazic:

Towards security architecture for future active IP networks. 183-195
Multimedia Security
- Martin Steinebach, Jana Dittmann, Eva Saar:

Combined fingerprinting attacks against digital audio watermarking: methods, results and solutions. 197-212 - Champskud J. Skrepth, Andreas Uhl:

Selective encryption of visual data. 213-226 - Václav Matyás Jr., Zdenek Ríha:

Biometric authentication - security and usability. 227-239
Applications Security
- Arno Hollosi, Udo Payer, Reinhard Posch:

Automatic authentication based on the Austrian citizen card. 241-253 - Arno Hollosi, Herbert Leitold, Reinhard Posch:

An open interface enabling secure e-government. 255-266 - Gasper Lavrencic, Borka Jerman-Blazic, Aleksej Jerman Blazic:

Cadenus security considerations. 267-278
Digital Signatures
- Karl Scheibelhofer:

Validation of long-term signatures. 279-292 - K. Kain, Sean W. Smith, R. Asokan:

Digital signatures and electronic documents: a cautionary tale. 293-308

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














