Skip to main content
  • Book
  • © 2002

Advanced Communications and Multimedia Security

IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26–27, 2002, Portorož, Slovenia

Part of the book series: IFIP Advances in Information and Communication Technology (IFIPAICT, volume 100)

Buying options

eBook USD 139.00
Price excludes VAT (USA)
  • ISBN: 978-0-387-35612-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 185.00
Price excludes VAT (USA)
Hardcover Book USD 179.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (23 chapters)

  1. Front Matter

    Pages i-x
  2. Applied Cryptography

    1. On the Security of a Structural Proven Signer Ordering Multisignature Scheme

      • Chris J. Mitchell, Namhyun Hur
      Pages 1-8Open Access
    2. Renewing Cryptographic Timestamps

      • Sattam S. Al-Riyami, Chris J. Mitchell
      Pages 9-16Open Access
    3. Implementing Elliptic Curve Cryptography

      • Wolfgang Bauer
      Pages 17-28Open Access
    4. A New Asymmetric Fingerprinting Framework Based on Secret Sharing

      • Yan Wang, Shuwang Lü, Zhenhua Liu
      Pages 29-40Open Access
    5. Authentication of Transit Flows and K-Siblings One-Time Signature

      • Mohamed Al-Ibrahim, Josef Pieprzyk
      Pages 41-55Open Access
  3. Communications Security

    1. Improving the Functionality of SYN Cookies

      • André Zúquete
      Pages 57-77Open Access
    2. A Mac-Layer Security Architecture for Cable Networks

      • Tadauchi Masaharu, Ishii Tatsuei, Itoh Susumu
      Pages 79-90Open Access
    3. Towards Authentication Using Mobile Devices

      • E. Weippl, W. Essmayr, F. Gruber, W. Stockner, T. Trenker
      Pages 91-105Open Access
    4. Enabling Adaptive and Secure Extranets

      • Yves Roudier, Olivier Fouache, Pierre Vannel, Refik Molva
      Pages 123-135Open Access
    5. Multiple Layer Encryption for Multicast Groups

      • Alain Pannetrat, Refik Molva
      Pages 137-153Open Access
  4. Distributed Systems Security

    1. Access Control, Reverse Access Control and Replication Control in a World Wide Distributed System

      • Bogdan C. Popescu, Chandana Gamage, Andrew S. Tanenbaum
      Pages 155-167Open Access
    2. The Coras Approach for Model-Based Risk Management Applied to E-Commerce Domain

      • Dimitris Raptis, Theo Dimitrakos, Bjørn Axel Gran, Ketil Stølen
      Pages 169-181Open Access
    3. Towards Security Architecture for Future Active IP Networks

      • Dusan Gabrijelčič, Arso Savanović, Borka Jerman Blažič
      Pages 183-195Open Access
  5. Multimedia Security

    1. Combined Fingerprinting Attacks Against Digital Audio Watermarking: Methods, Results and Solutions

      • Martin Steinebach, Jana Dittmann, Eva Saar
      Pages 197-212Open Access
    2. Selective Encryption of Visual Data

      • Champskud J. Skrepth, Andreas Uhl
      Pages 213-226Open Access
    3. Biometric Authentication — Security and Usability

      • Václav Matyáš, Zdeněk Říha
      Pages 227-239Open Access
  6. Applications Security

    1. Automatic Authentication Based on the Austrian Citizen Card

      • Arno Hollosi, Udo Payer, Reinhard Posch
      Pages 241-253Open Access
    2. An Open Interface Enabling Secure E-Government

      • Arno Hollosi, Reinhard Posch, Herbert Leitold
      Pages 255-266Open Access

About this book

Advanced Communications and Multimedia Security presents a state-of-the-art review of current perspectives as well as the latest developments in the area of communications and multimedia security. It examines requirements, issues and solutions pertinent to securing information networks, and identifies future security-related research challenges. A wide spectrum of topics is discussed, including:
-Applied cryptography;
-Biometry;
-Communication systems security;
-Applications security; Mobile security;
-Distributed systems security;
-Digital watermarking and digital signatures.

This volume comprises the proceedings of the sixth Joint Working Conference on Communications and Multimedia Security (CMS'02), which was sponsored by the International Federation for Information Processing (IFIP) and held in September 2002 in Portoroz, Slovenia. It constitutes essential reading for information security specialists, researchers and professionals working in the area of computer science and communication systems.

Keywords

  • Automat
  • communication
  • cryptography
  • data security
  • distributed systems
  • information
  • multimedia
  • tools

Editors and Affiliations

  • Institut “Jožef Stefan”, Slovenia

    Borka Jerman-Blažič, Tomaž Klobučar

Bibliographic Information

Buying options

eBook USD 139.00
Price excludes VAT (USA)
  • ISBN: 978-0-387-35612-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 185.00
Price excludes VAT (USA)
Hardcover Book USD 179.99
Price excludes VAT (USA)