Communications and multimedia security : 8th IFIP TC-6 TC-11 Conference on Communications and Mulltimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom
Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of Communications and Multimedia Security. This state-of-the-art volume presents the proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multime...
        Saved in:
      
    
          | Main Authors | , , | 
|---|---|
| Format | eBook Book | 
| Language | English | 
| Published | 
        New York
          Springer
    
        2005
     Great Britain  | 
| Series | IFIP series | 
| Subjects | |
| Online Access | Get full text | 
| ISBN | 9780387244853 0387244859  | 
Cover
                Table of Contents: 
            
                  - Intro -- Contents -- Preface -- Conference Program Committee -- Conference Organising Committee -- Part I: Privacy/Anonymity -- DUO-Onions and Hydra-Onions - Failure and Adversary Resistant Onion Protocols -- Personal Attributes and Privacy - How to Ensure that Private Attribute Management is not Subverted by Datamining -- Part II: Mobile Security 1 -- Local Management of Credits and Debits in Mobile Ad Hoc Networks -- How Secure are Current Mobile Operating Systems? -- An Overview of Security Issues and Techniques in Mobile Agents -- Part III: Mobile Security 2 -- A Secure Channel Protocol for Multi-application Smart Cards Based on Public Key Cryptography -- Mobile Trust Negotiation -- Weak Context Establishment Procedure for Mobility and Multi-Homing Management -- Part IV: Security in Microsoft .Net -- A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components -- Threat Modelling for Web Services Based Web Applications -- Threat Modelling For ASP.NET -- Threat Modelling for SQL Servers -- Threat Modelling for Active Directory -- Threat Modelling for Security Tokens in Web Applications -- Part V: Cryptography -- Analysis of the DVB Common Scrambling Algorithm -- An Extension of Typed MSR for Specifying Esoteric Protocols and their Dolev-Yao Intruder -- Part VI: Multimedia Security -- Robust Visual Hashing Using JPEG2000 -- A System For End-To-End Authentication Of Adaptive Multimedia Content -- Part VII: Application Level Security -- Using SAML To Link The Globus Toolkit To The PERMIS Authorisation Infrastructure -- Secure Role Based Messaging -- Five Non-Technical Pillars of Network Information Security Management -- Author Index