default search action
8th Communications and Multimedia Security 2004: Windermere, The Lake District, UK
- David Chadwick, Bart Preneel:
Communications and Multimedia Security - 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom. IFIP 175, Springer 2005, ISBN 978-0-387-24485-3 - Jan Iwanik, Marek Klonowski, Miroslaw Kutylowski:
Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion Protocols. 1-15 - Howard Chivers:
Personal Attributes and Privacy - How to ensure that private attribute management is not subverted by datamining. 17-29 - Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli:
Local Management of Credits and Debits in Mobile Ad Hoc Networks. 31-45 - Tobias Murmann, Heiko Rossnagel:
How Secure are Current Mobile Operating Systems? 47-58 - Mousa Alfalayleh, Ljiljana Brankovic:
An Overview of Security Issues and Techniques in Mobile Agents. 59-78 - Konstantinos Markantonakis, Keith Mayes:
A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography. 79-95 - Timothy W. van der Horst, Tore Sundelin, Kent E. Seamons, Charles D. Knutson:
Mobile Trust Negotiation - Authentication and Authorization in Dynamic Mobile Networks. 97-109 - Vesa Torvinen, Jukka Ylitalo:
Weak Context Establishment Procedure for Mobility and Multi-Homing Management. 111-123 - Lieven Desmet, Bart Jacobs, Frank Piessens, Wouter Joosen:
A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components. 125-130 - Lieven Desmet, Bart Jacobs, Frank Piessens, Wouter Joosen:
Threat Modelling for Web Services Based Web Applications. 131-144 - Rüidiger Grimm, Henrik Eichstädt:
Threat Modelling for ASP.NET - Designing Secure Applications. 145-158 - Elisa Bertino, Danilo Bruschi, Stefano Franzoni, Igor Nai Fovino, Stefano Valtolina:
Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application. 159-171 - David Chadwick:
Threat Modelling for Active Directory. 173-182 - Danny De Cock, Karel Wouters, Dries Schellekens, Dave Singelée, Bart Preneel:
Threat Modelling for Security Tokens in Web Applications. 183-193 - Ralf-Philipp Weinmann, Kai Wirt:
Analysis of the DVB Common Scrambling Algorithm. 195-207 - Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas:
An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder. 209-221 - Roland Norcen, Andreas Uhl:
Robust Visual Hashing Using JPEG 2000. 223-235 - Takashi Suzuki, Zulfikar Ramzan, Hiroshi Fujimoto, Craig Gentry, Takehiro Nakayama, Ravi Jain:
A System for End-to-End Authentication of Adaptive Multimedia Content. 237-249 - David W. Chadwick, Sassa Otenko, Von Welch:
Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure. 251-261 - David W. Chadwick, Graeme Lunt, Gansen Zhao:
Secure Role Based Messaging. 263-275 - Elmarie Kritzinger, Sebastiaan H. von Solms:
Five Non-Technical Pillars of Network Information Security Management. 277-287
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.