|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Antonio Lioy , Daniele MazzocchiPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2003 ed. Volume: 2828 Dimensions: Width: 15.50cm , Height: 1.40cm , Length: 23.30cm Weight: 0.880kg ISBN: 9783540201854ISBN 10: 3540201858 Pages: 268 Publication Date: 24 September 2003 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsCryptography.- Computation of Cryptographic Keys from Face Biometrics.- AUTHMAC_DH: A New Protocol for Authentication and Key Distribution.- Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection.- Network Security.- Securing the Border Gateway Protocol: A Status Update.- Towards an IPv6-Based Security Framework for Distributed Storage Resources.- Operational Characteristics of an Automated Intrusion Response System.- Mobile and Wireless Network Security.- A Secure Multimedia System in Emerging Wireless Home Networks.- Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents.- A Security Scheme for Mobile Agent Platforms in Large-Scale Systems.- Trust and Privacy.- Privacy and Trust in Distributed Networks.- Extending the SDSI / SPKI Model through Federation Webs.- Trust- : An XML Framework for Trust Negotiations.- Application Security.- How to Specify Security Services: A Practical Approach.- Application Level Smart Card Support through Networked Mobile Devices.- Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage.- Multimedia Security.- Selective Encryption of the JPEG2000 Bitstream.- Robust Spatial Data Hiding for Color Images.- Watermark Security via Secret Wavelet Packet Subband Structures.- A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression.- Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs.- Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |