Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings

Author:   Antonio Lioy ,  Daniele Mazzocchi
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2003 ed.
Volume:   2828
ISBN:  

9783540201854


Pages:   268
Publication Date:   24 September 2003
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $261.36 Quantity:  
Add to Cart

Share |

Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Antonio Lioy ,  Daniele Mazzocchi
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2003 ed.
Volume:   2828
Dimensions:   Width: 15.50cm , Height: 1.40cm , Length: 23.30cm
Weight:   0.880kg
ISBN:  

9783540201854


ISBN 10:   3540201858
Pages:   268
Publication Date:   24 September 2003
Audience:   General/trade ,  General
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Cryptography.- Computation of Cryptographic Keys from Face Biometrics.- AUTHMAC_DH: A New Protocol for Authentication and Key Distribution.- Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection.- Network Security.- Securing the Border Gateway Protocol: A Status Update.- Towards an IPv6-Based Security Framework for Distributed Storage Resources.- Operational Characteristics of an Automated Intrusion Response System.- Mobile and Wireless Network Security.- A Secure Multimedia System in Emerging Wireless Home Networks.- Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents.- A Security Scheme for Mobile Agent Platforms in Large-Scale Systems.- Trust and Privacy.- Privacy and Trust in Distributed Networks.- Extending the SDSI / SPKI Model through Federation Webs.- Trust- : An XML Framework for Trust Negotiations.- Application Security.- How to Specify Security Services: A Practical Approach.- Application Level Smart Card Support through Networked Mobile Devices.- Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage.- Multimedia Security.- Selective Encryption of the JPEG2000 Bitstream.- Robust Spatial Data Hiding for Color Images.- Watermark Security via Secret Wavelet Packet Subband Structures.- A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression.- Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs.- Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List