Amazon cover image
Image from Amazon.com
Image from Google Jackets

Communications and Multimedia Security. Advanced Techniques for Network and Data Protection [electronic resource] : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings / edited by Antonio Lioy, Daniele Mazzocchi.

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 2828Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2003Description: VIII, 268 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540451846
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 004.6 23
LOC classification:
  • TK5105.5-5105.9
Online resources:
Contents:
Cryptography -- Computation of Cryptographic Keys from Face Biometrics -- AUTHMAC_DH: A New Protocol for Authentication and Key Distribution -- Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection -- Network Security -- Securing the Border Gateway Protocol: A Status Update -- Towards an IPv6-Based Security Framework for Distributed Storage Resources -- Operational Characteristics of an Automated Intrusion Response System -- Mobile and Wireless Network Security -- A Secure Multimedia System in Emerging Wireless Home Networks -- Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents -- A Security Scheme for Mobile Agent Platforms in Large-Scale Systems -- Trust and Privacy -- Privacy and Trust in Distributed Networks -- Extending the SDSI / SPKI Model through Federation Webs -- Trust- : An XML Framework for Trust Negotiations -- Application Security -- How to Specify Security Services: A Practical Approach -- Application Level Smart Card Support through Networked Mobile Devices -- Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage -- Multimedia Security -- Selective Encryption of the JPEG2000 Bitstream -- Robust Spatial Data Hiding for Color Images -- Watermark Security via Secret Wavelet Packet Subband Structures -- A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression -- Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs -- Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Home library Call number Materials specified URL Status Date due Barcode
IMSc Library Link to resource Available EBK5232

Cryptography -- Computation of Cryptographic Keys from Face Biometrics -- AUTHMAC_DH: A New Protocol for Authentication and Key Distribution -- Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection -- Network Security -- Securing the Border Gateway Protocol: A Status Update -- Towards an IPv6-Based Security Framework for Distributed Storage Resources -- Operational Characteristics of an Automated Intrusion Response System -- Mobile and Wireless Network Security -- A Secure Multimedia System in Emerging Wireless Home Networks -- Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents -- A Security Scheme for Mobile Agent Platforms in Large-Scale Systems -- Trust and Privacy -- Privacy and Trust in Distributed Networks -- Extending the SDSI / SPKI Model through Federation Webs -- Trust- : An XML Framework for Trust Negotiations -- Application Security -- How to Specify Security Services: A Practical Approach -- Application Level Smart Card Support through Networked Mobile Devices -- Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage -- Multimedia Security -- Selective Encryption of the JPEG2000 Bitstream -- Robust Spatial Data Hiding for Color Images -- Watermark Security via Secret Wavelet Packet Subband Structures -- A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression -- Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs -- Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India