


default search action
10th Communications and Multimedia Security 2006: Heraklion, Crete, Greece
- Herbert Leitold, Evangelos P. Markatos:

Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings. Lecture Notes in Computer Science 4237, Springer 2006, ISBN 3-540-47820-5
Advances in Network and Information Security
- Huafei Zhu, Feng Bao, Jianwei Liu

:
Computing of Trust in Ad-Hoc Networks. 1-11 - Spyros Antonatos, Kostas G. Anagnostakis

:
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation. 12-21 - Dimitris Koukis, Spyros Antonatos, Kostas G. Anagnostakis

:
On the Privacy Risks of Publishing Anonymized IP Network Traces. 22-32 - Heiko Rossnagel

, Tobias Scherner:
Secure Mobile Notifications of Civilians in Case of a Disaster. 33-42 - Vincent Naessens, Liesje Demuynck, Bart De Decker:

A Fair Anonymous Submission and Review System. 43-53 - Isaac Agudo, Javier López, José A. Montenegro:

Attribute Delegation Based on Ontologies and Context Information. 54-66 - David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen:

Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. 67-86 - Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee:

One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. 87-96 - Elias Athanasopoulos, Spyros Antonatos:

Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart. 97-108 - Julien Bringer, Hervé Chabanne, Emmanuelle Dottax:

Perturbing and Protecting a Traceable Block Cipher. 109-119 - Jörg Platte, Raúl Durán Díaz, Edwin Naroska:

A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors. 120-129 - Konstantinos Chalkias, George Stephanides:

Timed Release Cryptography from Bilinear Pairings Using Hash Chains. 130-140 - Michael Gschwandtner, Andreas Uhl, Peter Wild:

Compression of Encrypted Visual Data. 141-150 - Heinz Hofbauer, Thomas Stütz, Andreas Uhl:

Selective Encryption for Hierarchical MPEG. 151-160 - Xiangyang Luo, Chunfang Yang, Fenlin Liu:

Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods. 161-172 - Kristof Verslype, Bart De Decker:

A Flexible and Open DRM Framework. 173-184 - Giannakis Antoniou, Campbell Wilson

, Dimitris Geneiatakis:
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies. 185-195 - Ni (Jenny) Zhang, Chris Todd:

A Privacy Agent in Context-Aware Ubiquitous Computing Environments. 196-205 - Seng-Phil Hong, Sungmin Kang:

Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems. 206-215 - Igor V. Kotenko

, Mikhail Stepashkin:
Attack Graph Based Evaluation of Network Security. 216-227 - Howard Chivers:

Information Modeling for Automated Risk Analysis. 228-239 - Andriy Panchenko, Lexi Pimenidis:

Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication. 240-251

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














