default search action
12th Communications and Multimedia Security 2011: Ghent, Belgium
- Bart De Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl:
Communications and Multimedia Security, 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings. Lecture Notes in Computer Science 7025, Springer 2011, ISBN 978-3-642-24711-8
Research Papers
- Jorn Lapon, Markulf Kohlweiss, Bart De Decker, Vincent Naessens:
Analysis of Revocation Strategies for Anonymous Idemix Credentials. 3-17 - Mahdi R. Alaghband, Mohammad Reza Aref:
A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks. 18-31 - Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider:
Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version). 32-44 - Kurt Dietrich, Johannes Winter, Granit Luzhnica, Siegfried Podesser:
Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms. 45-58 - Ronny Merkel, Jana Dittmann, Claus Vielhauer:
Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature. 59-71 - Reinhard Huber, Herbert Stögner, Andreas Uhl:
Two-Factor Biometric Recognition with Integrated Tamper-Protection Watermarking. 72-84 - Karl Kümmel, Tobias Scheidat, Christian Arndt, Claus Vielhauer:
Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting. 85-93 - Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Dynamic Software Birthmark for Java Based on Heap Memory Analysis. 94-107 - Li Weng, Bart Preneel:
A Secure Perceptual Hash Algorithm for Image Content Authentication. 108-121 - Steffen Wendzel, Jörg Keller:
Low-Attention Forwarding for Mobile Network Covert Channels. 122-133 - Fuwen Liu, Hartmut König:
Cryptanalysis of a SIP Authentication Scheme. 134-143
Work in Progress
- Lisa Rajbhandari, Einar Snekkenes:
Mapping between Classical Risk Management and Game Theoretical Approaches. 147-154 - Konstantinos Rantos:
Digital Signatures: How Close Is Europe to Truly Interoperable Solutions? 155-162 - Koen Decroix, Milica Milutinovic, Bart De Decker, Vincent Naessens:
A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning. 163-170 - Geoffrey Ottoy, Jeroen Martens, Nick Saeys, Bart Preneel, Lieven De Strycker, Jean-Pierre Goemaere, Tom Hamelinckx:
A Modular Test Platform for Evaluation of Security Protocols in NFC Applications. 171-177 - Georg Schönberger, Jürgen Fuß:
GPU-Assisted AES Encryption Using GCM. 178-185 - Dung Q. Nguyen, Li Weng, Bart Preneel:
Radon Transform-Based Secure Image Hashing. 186-193 - Philipp Winter, Harald Lampesberger, Markus Zeilinger, Eckehard Hermann:
On Detecting Abrupt Changes in Network Entropy Time Series. 194-205 - Krzysztof Juszczyszyn, Grzegorz Kolaczek:
Motif-Based Attack Detection in Network Communication Graphs. 206-213 - Milica Milutinovic, Roel Peeters, Bart De Decker:
Secure Negotiation for Manual Authentication Protocols. 214-221 - Mohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul:
A Secure One-Way Authentication Protocol in IMS Context. 222-231 - Mehdi Fallahpour, David Megías:
High Capacity FFT-Based Audio Watermarking. 235-237 - Matthew Hall, Reinoud Koornstra, Miranda Mowbray:
Efficient Prevention of Credit Card Leakage from Enterprise Networks. 238-240 - Jana Fruth, Ronny Merkel, Jana Dittmann:
Security Warnings for Children's Smart Phones: A First Design Approach. 241-243 - Muhammad Asim, Luan Ibraimi, Milan Petkovic:
Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme. 244-246 - Daniel Slamanig:
Anonymous Authentication from Public-Key Encryption Revisited - (Extended Abstract). 247-249
Keynotes
- Jaap-Henk Hoepman:
Mobile Identity Management. 253 - Ronald E. Leenes:
Who Needs Facebook Anyway - Privacy and Sociality in Social Network Sites. 254 - Moti Yung:
From Protecting a System to Protecting a Global Ecosystem. 255
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.