Stop the war!
Остановите войну!
for scientists:
default search action
11th Communications and Multimedia Security 2010: Linz, Austria
- Bart De Decker, Ingrid Schaumüller-Bichl:
Communications and Multimedia Security, 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings. Lecture Notes in Computer Science 6109, Springer 2010, ISBN 978-3-642-13240-7
WiFi and RF Security
- Amitabh Saxena, Ben Soh:
A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks. 4-15 - Saif M. Al-Kuwari, Stephen D. Wolthusen:
Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion. 16-27
XML and Web Services Security
- Armin Büscher, Michael Meier, Ralf Benzmüller:
Throwing a MonkeyWrench into Web Attackers Plans. 28-39 - Matthias Häsel, Luigi Lo Iacono:
Security in OpenSocial-Instrumented Social Networking Services. 40-52 - Nils Gruschka, Luigi Lo Iacono:
Security for XML Data Binding. 53-63
Watermarking and Multimedia Security
- Peter Meerwald, Andreas Uhl:
Watermark Detection for Video Bookmarking Using Mobile Phone Camera. 64-74 - Ulrich Rührmair, Stefan Katzenbeisser, Martin Steinebach, Sascha Zmudzinski:
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems. 75-80 - Thomas Stütz, Andreas Uhl:
Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking. 81-92
Analysis and Detection of Malicious Code and Risk Management
- Ronny Merkel, Tobias Hoppe, Christian Krätzer, Jana Dittmann:
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis. 93-105 - Nicolas Racz, Edgar R. Weippl, Andreas Seufert:
A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC). 106-117 - Wolfgang Neudorfer, Louis Marinos, Ingrid Schaumüller-Bichl:
Business and IT Continuity Benchmarking. 118-129
VoIP Security
- Ge Zhang, Simone Fischer-Hübner:
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks. 130-141 - Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi, Simone Fischer-Hübner:
SIP Proxies: New Reflectors in the Internet. 142-153 - Patrick Battistello, Cyril Delétré:
Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal. 154-165
Biometrics
- Stefan Rass, David Schuller, Christian Kollmitzer:
Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication. 166-177 - Karl Kümmel, Claus Vielhauer, Tobias Scheidat, Dirk Franke, Jana Dittmann:
Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction. 178-190 - Christian Rathgeb, Andreas Uhl:
Privacy Preserving Key Generation for Iris Biometrics. 191-200
Applied Cryptography
- Daniel Slamanig, Stefan Rass:
Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare. 201-213 - Chul Sur, Chae Duk Jung, Youngho Park, Kyung Hyune Rhee:
Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption. 214-232 - Christopher James Hargreaves, Howard Chivers:
Detecting Hidden Encrypted Volumes. 233-244
Secure Communications
- Markus Huber, Martin Mulazzani, Edgar R. Weippl:
Tor HTTP Usage and Information Leakage. 245-255 - Sebastian Roschke, Luan Ibraimi, Feng Cheng, Christoph Meinel:
Secure Communication Using Identity Based Encryption. 256-267 - Kurt Dietrich:
Anonymous Client Authentication for Transport Layer Security. 268-280
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.