通信与多媒体安全 CMS 2006/会议录LNCS-4237

通信与多媒体安全 CMS 2006/会议录LNCS-4237
作 者: Herbert Leitold
出版社: 湖南文艺出版社
丛编项:
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 暂缺
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《通信与多媒体安全 CMS 2006/会议录LNCS-4237》作者简介

内容简介

The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community, with numerous individuals, as well as with prestigious organizations and Societies, LNCS has grown into the most comprehensive computer science research forum available.The scope of LNCS, including its sub series LNAI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material published traditionally includes- Proceedings(published in time for the respective conference) - Post-proceedings(consisting of thoroughly revised final full papers) -research monographs(which may be based on outstanding PhD work, research projects, technical reports, etc.)

图书目录

Advances in Network and Information Security

Computing of Trust in Ad-Hoc Networks

TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation

On the Privacy Risks of Publishing Anonymized IP Network Traces

Secure Mobile Notifications of Civilians in Case of a Disaster

A Fair Anonymous Submission and Review System

Attribute Delegation Based on Ontologies and Context Information

Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains

One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange

Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart

Perturbing and Protecting a Traceable Block Cipher

A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors

Timed Release Cryptography from Bilinear Pairings Using Hash Chains

Compression of Encrypted Visual Data

Selective Encryption for Hierarchical MPEG

Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods

A Flexible and Open DRM Framework

PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies

A Privacy Agent in Context-Aware Ubiquitous Computing Environments

Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems

Attack Graph Based Evaluation of Network Security

Information Modeling for Automated Risk Analysis

Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication

Author Index