Communications and Multimedia Security. Advanced Techniques for Network and Data Protection [electronic resource] : 7th IFIP-TC6 TC11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003. Proceedings / edited by Antonio Lioy, Daniele Mazzocchi.
Material type:
TextSeries: Lecture Notes in Computer Science ; 2828Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2003Description: VIII, 268 p. online resourceContent type: - text
- computer
- online resource
- 9783540451846
- Computer science
- Computer Communication Networks
- Operating systems (Computers)
- Data encryption (Computer science)
- Multimedia systems
- Information Systems
- Computer Science
- Computer Communication Networks
- Operating Systems
- Data Encryption
- Multimedia Information Systems
- Computers and Society
- Management of Computing and Information Systems
- 004.6 23
- TK5105.5-5105.9
E-BOOKS
| Home library | Call number | Materials specified | URL | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
| IMSc Library | Link to resource | Available | EBK5232 |
Cryptography -- Computation of Cryptographic Keys from Face Biometrics -- AUTHMAC_DH: A New Protocol for Authentication and Key Distribution -- Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection -- Network Security -- Securing the Border Gateway Protocol: A Status Update -- Towards an IPv6-Based Security Framework for Distributed Storage Resources -- Operational Characteristics of an Automated Intrusion Response System -- Mobile and Wireless Network Security -- A Secure Multimedia System in Emerging Wireless Home Networks -- Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents -- A Security Scheme for Mobile Agent Platforms in Large-Scale Systems -- Trust and Privacy -- Privacy and Trust in Distributed Networks -- Extending the SDSI / SPKI Model through Federation Webs -- Trust- : An XML Framework for Trust Negotiations -- Application Security -- How to Specify Security Services: A Practical Approach -- Application Level Smart Card Support through Networked Mobile Devices -- Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage -- Multimedia Security -- Selective Encryption of the JPEG2000 Bitstream -- Robust Spatial Data Hiding for Color Images -- Watermark Security via Secret Wavelet Packet Subband Structures -- A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression -- Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs -- Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization.
There are no comments on this title.