Skip to main content
  • Conference proceedings
  • © 2006

Communications and Multimedia Security

10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4237)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CMS: IFIP International Conference on Communications and Multimedia Security

Conference proceedings info: CMS 2006.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (22 papers)

  1. Front Matter

  2. Computing of Trust in Ad-Hoc Networks

    • Huafei Zhu, Feng Bao, Jianwei Liu
    Pages 1-11
  3. TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation

    • Spiros Antonatos, Kostas G. Anagnostakis
    Pages 12-21
  4. On the Privacy Risks of Publishing Anonymized IP Network Traces

    • D. Koukis, S. Antonatos, K. G. Anagnostakis
    Pages 22-32
  5. Secure Mobile Notifications of Civilians in Case of a Disaster

    • Heiko Rossnagel, Tobias Scherner
    Pages 33-42
  6. A Fair Anonymous Submission and Review System

    • Vincent Naessens, Liesje Demuynck, Bart De Decker
    Pages 43-53
  7. Attribute Delegation Based on Ontologies and Context Information

    • Isaac Agudo, Javier Lopez, Jose A. Montenegro
    Pages 54-66
  8. Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains

    • David W Chadwick, Sassa Otenko, Tuan Anh Nguyen
    Pages 67-86
  9. One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange

    • Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee
    Pages 87-96
  10. Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart

    • Elias Athanasopoulos, Spiros Antonatos
    Pages 97-108
  11. Perturbing and Protecting a Traceable Block Cipher

    • Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
    Pages 109-119
  12. A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors

    • Jörg Platte, Raúl Durán Díaz, Edwin Naroska
    Pages 120-129
  13. Timed Release Cryptography from Bilinear Pairings Using Hash Chains

    • Konstantinos Chalkias, George Stephanides
    Pages 130-140
  14. Compression of Encrypted Visual Data

    • Michael Gschwandtner, Andreas Uhl, Peter Wild
    Pages 141-150
  15. Selective Encryption for Hierarchical MPEG

    • Heinz Hofbauer, Thomas Stütz, Andreas Uhl
    Pages 151-160
  16. Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods

    • Xiangyang Luo, Chunfang Yang, Fenlin Liu
    Pages 161-172
  17. A Flexible and Open DRM Framework

    • Kristof Verslype, Bart De Decker
    Pages 173-184
  18. PPINA – A Forensic Investigation Protocol for Privacy Enhancing Technologies

    • Giannakis Antoniou, Campbell Wilson, Dimitris Geneiatakis
    Pages 185-195
  19. A Privacy Agent in Context-Aware Ubiquitous Computing Environments

    • Ni (Jenny) Zhang, Chris Todd
    Pages 196-205

Other Volumes

  1. Communications and Multimedia Security

About this book

Duringthelastfewyearsweseenetworkandinformationsystemsecurityplaying an increasingly important role in our everyday lives. As our computers continue to get infested by all sorts of malware, and as our networks continue to choke with spam and malicious tra?c, we see more and more people losing their co- dence in information technologies as they get signi?cantly concernedabout their security as well as their privacy and that of their loved ones. In their e?ort to cope with the problem, scientists, managers, and politicians all over the world havedesignedandarecurrently implementing systematicapproachesto network and information security, most of which are underlined by the same principle: there is much more room for improvement and research. Along the lines of encouraging and catalyzing research in the area of c- munications and multimedia security, it is our great pleasure to present the proceedings of the 10th IFIP TC-6 TC-11 Conference on Communications and MultimediaSecurity(CMS2006),whichwasheldinHeraklion,CreteonOctober 19-21, 2006. Continuing the tradition of previous CMS conferences, we sought a balanced program containing presentations on various aspects of secure c- munication and multimedia systems. Special emphasis was laid on papers with direct practical relevance for the construction of secure communication systems. The selection of the program was a challenging task. In total, we received 76 submissions, from which 22 were selected for presentation as full papers.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access