05645nam 22008655 450 991014403590332120251116234359.03-540-45184-610.1007/b13863(CKB)1000000000212208(SSID)ssj0000321934(PQKBManifestationID)11262366(PQKBTitleCode)TC0000321934(PQKBWorkID)10281040(PQKB)10608473(DE-He213)978-3-540-45184-6(MiAaPQ)EBC3087902(PPN)155202383(BIP)13638350(BIP)9023200(EXLCZ)99100000000021220820121227d2003 u| 0engurnn#008mamaatxtccrCommunications and Multimedia Security. Advanced Techniques for Network and Data Protection 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings /edited by Antonio Lioy, Daniele Mazzocchi1st ed. 2003.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2003.1 online resource (VIII, 268 p.)Lecture Notes in Computer Science,0302-9743 ;2828Bibliographic Level Mode of Issuance: Monograph3-540-20185-8 Includes bibliographical references at the end of each chapters and index.Cryptography -- Computation of Cryptographic Keys from Face Biometrics -- AUTHMAC_DH: A New Protocol for Authentication and Key Distribution -- Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection -- Network Security -- Securing the Border Gateway Protocol: A Status Update -- Towards an IPv6-Based Security Framework for Distributed Storage Resources -- Operational Characteristics of an Automated Intrusion Response System -- Mobile and Wireless Network Security -- A Secure Multimedia System in Emerging Wireless Home Networks -- Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents -- A Security Scheme for Mobile Agent Platforms in Large-Scale Systems -- Trust and Privacy -- Privacy and Trust in Distributed Networks -- Extending the SDSI / SPKI Model through Federation Webs -- Trust- : An XML Framework for Trust Negotiations -- Application Security -- How to Specify Security Services: A Practical Approach -- Application Level Smart Card Support through Networked Mobile Devices -- Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage -- Multimedia Security -- Selective Encryption of the JPEG2000 Bitstream -- Robust Spatial Data Hiding for Color Images -- Watermark Security via Secret Wavelet Packet Subband Structures -- A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression -- Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs -- Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization.This book constitutes the refereed proceedings of the 7th IFIP International Conference on Communications and Multimedia Security, CMS 2003, held in Torino, Italy in October 2003.The 21 revised full papers presented were carefully reviewed and selected for presentation. The papers are organized in topical sections on cryptography, network security, mobile and wireless network security, trust and privacy, application security, and multimedia security.Lecture Notes in Computer Science,0302-9743 ;2828Data encryption (Computer science)Computer networksOperating systems (Computers)Multimedia systemsComputers and civilizationManagement information systemsComputer scienceCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Multimedia Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I18059Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Data encryption (Computer science)Computer networks.Operating systems (Computers)Multimedia systems.Computers and civilization.Management information systems.Computer science.Cryptology.Computer Communication Networks.Operating Systems.Multimedia Information Systems.Computers and Society.Management of Computing and Information Systems.005.8Lioy Antonioedthttp://id.loc.gov/vocabulary/relators/edtMazzocchi Danieleedthttp://id.loc.gov/vocabulary/relators/edtCMS 2003MiAaPQMiAaPQMiAaPQBOOK9910144035903321Communications and Multimedia Security. Advanced Techniques for Network and Data Protection2262769UNINA