Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany

Author:   Ralf Steinmetz ,  Jana Dittmann ,  Martin Steinebach
Publisher:   Springer
Edition:   2001 ed.
Volume:   64
ISBN:  

9780792373650


Pages:   432
Publication Date:   31 May 2001
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $741.84 Quantity:  
Add to Cart

Share |

Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany


Add your own review!

Overview

This text presents a review of current perspectives on communications and multimedia security in 2001. It examines requirements, issues, and solutions pertinent to securing information networks according to a multi-disciplinary approach covering research aspects, legal aspects, and applications. A wide spectrum of topics is discussed, including: Web security; watermarking; cryptographic algorithms; system security; mobile security; and secure key protocols. This volume contains papers presented at the fifth Joint Working Conference on Communications and Multimedia Security (CMS'01), which was sponsored by the International Federation for Information Processing (IFIP) and held on May 21-22, 2001, in Darmstadt, Germany. It should be of interest to information security specialists, computer professionals, communication systems professionals, EDP managers and auditors, and researchers in the area.

Full Product Details

Author:   Ralf Steinmetz ,  Jana Dittmann ,  Martin Steinebach
Publisher:   Springer
Imprint:   Springer
Edition:   2001 ed.
Volume:   64
Dimensions:   Width: 15.60cm , Height: 2.50cm , Length: 23.40cm
Weight:   1.760kg
ISBN:  

9780792373650


ISBN 10:   0792373650
Pages:   432
Publication Date:   31 May 2001
Audience:   College/higher education ,  Professional and scholarly ,  Undergraduate ,  Postgraduate, Research & Scholarly
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Web Security.- What You See Is What You Sign —Trustworthy Display of XML Documents for Signing and Verification.- XML Electronic Signatures.- An integrated secure Web architecture for protected Mobile code distribution.- Secure and anonymous multicast framework.- Vulnerabilities and Security Limitations of current IP Telephony Systems.- Watermarking I.- Quantization Watermarking in the JPEG2000 Coding Pipeline.- Theoretic Performance Analysis of a Watermarking System based on Bernoulli Chaotic Sequences.- Scalable Detection of Perceptual Watermarks in JPEG2000 Images.- Cryptographic Algorithms.- Collecting randomness from the net.- Encryption System Based on Neutral Network.- A Modified Chaotic Cryptographic Method.- An Elliptic Curve Random Number Generator.- Watermarking II.- Conditional and User Specific Access to Services and Resources Using Annotation Watermarks.- Large Scale distributed watermarking of multicast media through encryption.- Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept.- Fingerprints for Copyright Protection.- System Security.- Software Security Assessment through Specification Mutations and Fault Injection.- Asynchronous Large-Scale Certification Based on Certificate Verification Trees.- ACLA: A Framework for Access Control List (ACL) Analysis and Optimization.- Transparent Access To Encrypted Data Using Operating System Network Stack Extensions.- A PC Cryptographic Coprocessor Based on TI Signal Processor And Smart Card System.- Watermarking III.- Optimization of Watermarking Performances Using Error Correcting Codes and Repetition.- Using Raw Speech as a Watermark, does it work?.- Multiple Security Aspects.- Transferability in Coin Systems with Observers.- Secure iLearning.- Tree-based Multicast KeyAgreement.- Security for the core network of third generation mobile systems.- Secure Internet Phone.- Posters.- Secure Meeting Scheduling with AgenTa.- Virtual Hidden Network.- Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval.- A Prepositioned Secret Sharing Scheme for Message Authentication in Broadcast Networks.- Secure Service Centered Networking for Nomadic Usage.- Last Minute Papers.- A Secure Authentication Infrastructure for Mobile Communication Services over the Internet.- Blind Compressed-Domain Watermarking for MPEG-encoded Videos.- Index of Contributors.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List