Skip to main content
  • Conference proceedings
  • © 2011

Communications and Multimedia Security

12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21, 2011, Proceedings

  • Fast-track conference proceedings

  • State-of-the-art research

  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7025)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CMS: IFIP International Conference on Communications and Multimedia Security

Conference proceedings info: CMS 2011.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (30 papers)

  1. Front Matter

  2. Research Papers

    1. Front Matter

      Pages 1-1
    2. Applicability and Interoperability

      1. Analysis of Revocation Strategies for Anonymous Idemix Credentials
        • Jorn Lapon, Markulf Kohlweiss, Bart De Decker, Vincent Naessens
        Pages 3-17
    3. Architecture and Framework Security

      1. A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks
        • Mahdi R. Alagheband, Mohammad Reza Aref
        Pages 18-31
      2. Twin Clouds: Secure Cloud Computing with Low Latency
        • Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider
        Pages 32-44
    4. Secure Hardware Platforms

      1. Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms
        • Kurt Dietrich, Johannes Winter, Granit Luzhnica, Siegfried Podesser
        Pages 45-58
    5. Multimedia Security

      1. Dynamic Software Birthmark for Java Based on Heap Memory Analysis
        • Patrick P. F. Chan, Lucas C. K. Hui, S. M. Yiu
        Pages 94-107
    6. Network Security

      1. Low-Attention Forwarding for Mobile Network Covert Channels
        • Steffen Wendzel, Jörg Keller
        Pages 122-133
    7. Authentication

      1. Cryptanalysis of a SIP Authentication Scheme
        • Fuwen Liu, Hartmut Koenig
        Pages 134-143
  3. Work in Progress

    1. Front Matter

      Pages 145-145
    2. Applicability and Interoperability

      1. Mapping between Classical Risk Management and Game Theoretical Approaches
        • Lisa Rajbhandari, Einar Arthur Snekkenes
        Pages 147-154
    3. Architecture and Framework Security

      1. A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning
        • Koen Decroix, Milica Milutinovic, Bart De Decker, Vincent Naessens
        Pages 163-170
    4. Secure Hardware Platforms

      1. A Modular Test Platform for Evaluation of Security Protocols in NFC Applications
        • Geoffrey Ottoy, Jeroen Martens, Nick Saeys, Bart Preneel, Lieven De Strycker, Jean-Pierre Goemaere et al.
        Pages 171-177
      2. GPU-Assisted AES Encryption Using GCM
        • Georg Schönberger, Jürgen Fuß
        Pages 178-185
    5. Multimedia Security

      1. Radon Transform-Based Secure Image Hashing
        • Dung Q. Nguyen, Li Weng, Bart Preneel
        Pages 186-193

Other Volumes

  1. Communications and Multimedia Security

About this book

This book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011. The 26 revised papers presented were carefully reviewed and selected from 52 submissions. The papers are organized in topical sections on usability, architecture and framework security, mobile identity management, secure hardware platforms, biometrics, multimedia security, network security and authentication.

Keywords

  • VoIP
  • cloud security
  • cryptanalysis
  • signcryption
  • software protection
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Department of Computer Science - DistriNet, K.U. Leuven, Leuven, Belgium

    Bart Decker

  • KAHO Sint-Lieven - MSEC, Gent, Belgium

    Jorn Lapon, Vincent Naessens

  • Visual Computing and Multimedia, University of Salzburg, Salzburg, Austria

    Andreas Uhl

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions