000 05537nam a22003975i 4500
001 294832
003 MX-SnUAN
005 20160429155202.0
007 cr nn 008mamaa
008 150903s2005 gw | o |||| 0|eng d
020 _a9783540319788
_99783540319788
024 7 _a10.1007/11552055
_2doi
035 _avtls000348093
039 9 _a201509030739
_bVLOAD
_c201404121040
_dVLOAD
_c201404090817
_dVLOAD
_y201402071019
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
050 4 _aTK5105.5-5105.9
100 1 _aDittmann, Jana.
_eeditor.
_9328757
245 1 0 _aCommunications and Multimedia Security :
_b9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 – 21, 2005. Proceedings /
_cedited by Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2005.
300 _axiii, 360 páginas Also avaible online.
_brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v3677
500 _aSpringer eBooks
505 0 _aApplied Cryptography -- Fast Contract Signing with Batch Oblivious Transfer -- An Instruction Set Extension for Fast and Memory-Efficient AES Implementation -- Self-healing Key Distribution Schemes with Sponsorization -- DRM & E-Commerce -- Effective Protection Against Phishing and Web Spoofing -- Identity Based DRM: Personal Entertainment Domain -- Rights and Trust in Multimedia Information Management -- Signature Amortization Using Multiple Connected Chains -- Media Encryption -- A Key Embedded Video Codec for Secure Video Multicast -- Puzzle – A Novel Video Encryption Algorithm -- Selective Image Encryption Using JBIG -- Multimedia Security -- On Reversibility of Random Binning Techniques: Multimedia Perspectives -- A Graph–Theoretic Approach to Steganography -- Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme -- Privacy -- Video Surveillance: A Distributed Approach to Protect Privacy -- Privacy-Preserving Electronic Health Records -- Using XACML for Privacy Control in SAML-Based Identity Federations -- Biometrics & Access Control -- Verifier-Tuple as a Classifier for Biometric Handwriting Authentication – Combination of Syntax and Semantics -- Decentralised Access Control in 802.11 Networks -- Multimodal Biometrics for Voice and Handwriting -- Network Security -- Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks -- Polymorphic Code Detection with GA Optimized Markov Models -- A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks -- Mobile Security -- Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets -- Assessment of Palm OS Susceptibility to Malicious Code Threats -- Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication -- Work in Progress Track -- Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting -- INVUS: INtelligent VUlnerability Scanner -- Personal Rights Management– Enabling Privacy Rights in Digital Online Content -- Flexible Traitor Tracing for Anonymous Attacks -- Efficient Key Distribution for Closed Meetings in the Internet -- Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics -- Applying LR Cube Analysis to JSteg Detection -- Digital Signatures Based on Invertible Watermarks for Video Authentication -- A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents -- Semantically Extended Digital Watermarking Model for Multimedia Content -- An Architecture for Secure Policy Enforcement in E-Government Services Deployment -- Some Critical Aspects of the PKIX TSP -- Motivations for a Theoretical Approach to WYSIWYS -- Special Session: XML Security -- Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications -- Integrating XML Linked Time-Stamps in OASIS Digital Signature Services -- Trustworthy Verification and Visualisation of Multiple XML-Signatures -- Experience XML Security -- How to Make a Federation Manageable -- XML Signatures in an Enterprise Service Bus Environment -- Using the XML Key Management Specification (and Breaking X.509 Rules as You Go).
520 _aThis book constitutes the refereed proceedings of the 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, CMS 2005, held in Salzburg, Austria in September 2005. The 28 revised full papers and 13 two-page abstracts presented together with 4 invited papers were carefully reviewed and selected from 143 submissions. The papers are organized in topical sections on applied cryptography, DRM and e-commerce, media encryption, multimedia security, privacy, biometrics and access control, network security, mobile security, and XML security.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aKatzenbeisser, Stefan.
_eeditor.
_9328713
700 1 _aUhl, Andreas.
_eeditor.
_9317886
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9783540287919
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/11552055
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c294832
_d294832