Advanced Communications and Multimedia Security

IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26–27, 2002, Portorož, Slovenia

Editors:

ISBN: 978-1-4757-4405-7 (Print) 978-0-387-35612-9 (Online)

Table of contents (22 chapters)

previous Page of 2
  1. Front Matter

    Pages i-x

  2. Applied Cryptography

    1. No Access

      Book Chapter

      Pages 1-8

      On the Security of a Structural Proven Signer Ordering Multisignature Scheme

    2. No Access

      Book Chapter

      Pages 9-16

      Renewing Cryptographic Timestamps

    3. No Access

      Book Chapter

      Pages 17-28

      Implementing Elliptic Curve Cryptography

    4. No Access

      Book Chapter

      Pages 29-40

      A New Asymmetric Fingerprinting Framework Based on Secret Sharing

    5. No Access

      Book Chapter

      Pages 41-55

      Authentication of Transit Flows and K-Siblings One-Time Signature

  3. Communications Security

    1. No Access

      Book Chapter

      Pages 57-77

      Improving the Functionality of SYN Cookies

    2. No Access

      Book Chapter

      Pages 79-90

      A Mac-Layer Security Architecture for Cable Networks

    3. No Access

      Book Chapter

      Pages 91-105

      Towards Authentication Using Mobile Devices

    4. No Access

      Book Chapter

      Pages 107-121

      Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks

    5. No Access

      Book Chapter

      Pages 123-135

      Enabling Adaptive and Secure Extranets

    6. No Access

      Book Chapter

      Pages 137-153

      Multiple Layer Encryption for Multicast Groups

  4. Distributed Systems Security

    1. No Access

      Book Chapter

      Pages 155-167

      Access Control, Reverse Access Control and Replication Control in a World Wide Distributed System

    2. No Access

      Book Chapter

      Pages 169-181

      The Coras Approach for Model-Based Risk Management Applied to E-Commerce Domain

    3. No Access

      Book Chapter

      Pages 183-195

      Towards Security Architecture for Future Active IP Networks

  5. Multimedia Security

    1. No Access

      Book Chapter

      Pages 197-212

      Combined Fingerprinting Attacks Against Digital Audio Watermarking: Methods, Results and Solutions

    2. No Access

      Book Chapter

      Pages 213-226

      Selective Encryption of Visual Data

    3. No Access

      Book Chapter

      Pages 227-239

      Biometric Authentication — Security and Usability

  6. Applications Security

    1. No Access

      Book Chapter

      Pages 241-253

      Automatic Authentication Based on the Austrian Citizen Card

    2. No Access

      Book Chapter

      Pages 255-266

      An Open Interface Enabling Secure E-Government

    3. No Access

      Book Chapter

      Pages 267-278

      Cadenus Security Considerations

previous Page of 2