Skip to main content
  • Conference proceedings
  • © 2003

Computer Network Security

Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings

Conference proceedings info: MMM-ACNS 2003.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (47 papers)

  1. Public Key Distribution, Authentication, Access Control

    1. Key History Tree: Efficient Group Key Management with Off-Line Members

      • Antonio Lain, Viacheslav Borisov
      Pages 241-254
    2. A Certificate Status Checking Protocol for the Authenticated Dictionary

      • Jose L. Munoz, Jordi Forne, Oscar Esparza, Miguel Soriano
      Pages 255-266
  2. Cryptography

    1. Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property

      • Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim
      Pages 298-307
    2. Elliptic Curve Point Multiplication

      • Alexander Rostovtsev, Elena Makhovenko
      Pages 328-336
    3. Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation

      • N. Sklavos, A. A. Moldovyan, O. Koufopavlou
      Pages 337-348
  3. Steganography

    1. Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation

      • Kaiwen Zhang, Shuozhong Wang, Xinpeng Zhang
      Pages 360-370
    2. Digital Watermarking under a Filtering and Additive Noise Attack Condition

      • Valery Korzhik, Guillermo Morales-Luna, Irina Marakova, Carlos Patiño-Ruvalcaba
      Pages 371-382
    3. Data Hiding in Digital Audio by Frequency Domain Dithering

      • Shuozhong Wang, Xinpeng Zhang, Kaiwen Zhang
      Pages 383-394
    4. Steganography with Least Histogram Abnormality

      • Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang
      Pages 395-406
    5. Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences

      • Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang
      Pages 407-418
  4. Short Papers

    1. Authentication of Anycast Communication

      • Mohamed Al-Ibrahim, Anton Cerny
      Pages 419-423
    2. Construction of the Covert Channels

      • Alexander Grusho, Elena Timonina
      Pages 428-431
    3. Privacy and Data Protection in Electronic Communications

      • Lilian Mitrou, Konstantinos Moulinos
      Pages 432-435

Other Volumes

  1. Computer Network Security

Editors and Affiliations

  • St. Petersburg Intitute for Informaticsand Automation, St. Petersburg, Russia

    Vladimir Gorodetsky

  • AFRL/IF, Rome, USA

    Leonard Popyack

  • US Air Force, Binghamton University (SUNYI), Binghamton, USA

    Victor Skormin

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access