


default search action
11th Communications and Multimedia Security 2010: Linz, Austria
- Bart De Decker, Ingrid Schaumüller-Bichl:

Communications and Multimedia Security, 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings. Lecture Notes in Computer Science 6109, Springer 2010, ISBN 978-3-642-13240-7
WiFi and RF Security
- Amitabh Saxena, Ben Soh:

A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks. 4-15 - Saif M. Al-Kuwari

, Stephen D. Wolthusen:
Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion. 16-27
XML and Web Services Security
- Armin Büscher, Michael Meier

, Ralf Benzmüller:
Throwing a MonkeyWrench into Web Attackers Plans. 28-39 - Matthias Häsel, Luigi Lo Iacono

:
Security in OpenSocial-Instrumented Social Networking Services. 40-52 - Nils Gruschka, Luigi Lo Iacono

:
Security for XML Data Binding. 53-63
Watermarking and Multimedia Security
- Peter Meerwald

, Andreas Uhl:
Watermark Detection for Video Bookmarking Using Mobile Phone Camera. 64-74 - Ulrich Rührmair, Stefan Katzenbeisser, Martin Steinebach, Sascha Zmudzinski:

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems. 75-80 - Thomas Stütz, Andreas Uhl:

Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking. 81-92
Analysis and Detection of Malicious Code and Risk Management
- Ronny Merkel, Tobias Hoppe, Christian Krätzer, Jana Dittmann:

Statistical Detection of Malicious PE-Executables for Fast Offline Analysis. 93-105 - Nicolas Racz, Edgar R. Weippl, Andreas Seufert:

A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC). 106-117 - Wolfgang Neudorfer, Louis Marinos, Ingrid Schaumüller-Bichl:

Business and IT Continuity Benchmarking. 118-129
VoIP Security
- Ge Zhang, Simone Fischer-Hübner:

Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks. 130-141 - Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi, Simone Fischer-Hübner:

SIP Proxies: New Reflectors in the Internet. 142-153 - Patrick Battistello, Cyril Delétré:

Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal. 154-165
Biometrics
- Stefan Rass

, David Schuller, Christian Kollmitzer:
Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication. 166-177 - Karl Kümmel, Claus Vielhauer, Tobias Scheidat, Dirk Franke, Jana Dittmann:

Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction. 178-190 - Christian Rathgeb, Andreas Uhl:

Privacy Preserving Key Generation for Iris Biometrics. 191-200
Applied Cryptography
- Daniel Slamanig

, Stefan Rass
:
Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare. 201-213 - Chul Sur, Chae Duk Jung, Youngho Park, Kyung Hyune Rhee:

Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption. 214-232 - Christopher James Hargreaves

, Howard Chivers:
Detecting Hidden Encrypted Volumes. 233-244
Secure Communications
- Markus Huber

, Martin Mulazzani, Edgar R. Weippl:
Tor HTTP Usage and Information Leakage. 245-255 - Sebastian Roschke, Luan Ibraimi, Feng Cheng, Christoph Meinel:

Secure Communication Using Identity Based Encryption. 256-267 - Kurt Dietrich:

Anonymous Client Authentication for Transport Layer Security. 268-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














