LEADER 05518nam 2200661 a 450 001 9910483758403321 005 20200520144314.0 010 $a3-540-47823-X 024 7 $a10.1007/11909033 035 $a(CKB)1000000000283765 035 $a(SSID)ssj0000316709 035 $a(PQKBManifestationID)11273181 035 $a(PQKBTitleCode)TC0000316709 035 $a(PQKBWorkID)10275483 035 $a(PQKB)10126267 035 $a(DE-He213)978-3-540-47823-2 035 $a(MiAaPQ)EBC3068531 035 $a(PPN)123139325 035 $a(EXLCZ)991000000000283765 100 $a20060912d2006 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCommunications and multimedia security $e10th IFIP TC-6 TC-11 international conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006 : proceedings /$fHerbert Leitold, Evangelos Markatos (eds.) 205 $a1st ed. 2006. 210 $aBerlin ;$aNew York $cSpringer$dc2006 215 $a1 online resource (XII, 260 p.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v4237 225 1 $aLNCS sublibrary. SL 4, Security and cryptology 300 $a"10th IFIP TC-6 TC-11 [International] Conference on Communications and Multimedia Security"--Pref. 311 $a3-540-47820-5 320 $aIncludes bibliographical references and index. 327 $aComputing of Trust in Ad-Hoc Networks -- TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation -- On the Privacy Risks of Publishing Anonymized IP Network Traces -- Secure Mobile Notifications of Civilians in Case of a Disaster -- A Fair Anonymous Submission and Review System -- Attribute Delegation Based on Ontologies and Context Information -- Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains -- One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange -- Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart -- Perturbing and Protecting a Traceable Block Cipher -- A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors -- Timed Release Cryptography from Bilinear Pairings Using Hash Chains -- Compression of Encrypted Visual Data -- Selective Encryption for Hierarchical MPEG -- Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods -- A Flexible and Open DRM Framework -- PPINA ? A Forensic Investigation Protocol for Privacy Enhancing Technologies -- A Privacy Agent in Context-Aware Ubiquitous Computing Environments -- Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems -- Attack Graph Based Evaluation of Network Security -- Information Modeling for Automated Risk Analysis -- Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication. 330 $aDuringthelastfewyearsweseenetworkandinformationsystemsecurityplaying an increasingly important role in our everyday lives. As our computers continue to get infested by all sorts of malware, and as our networks continue to choke with spam and malicious traffic, we see more and more people losing their confidence in information technologies as they get significantly concerned about their security as well as their privacy and that of their loved ones. In their e?ort to cope with the problem, scientists, managers, and politicians all over the world have designed and are currently implementing systematic approaches to network and information security, most of which are underlined by the same principle: there is much more room for improvement and research. Along the lines of encouraging and catalyzing research in the area of communications and multimedia security, it is our great pleasure to present the proceedings of the 10th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security(CMS2006),which was held in Heraklion, Crete on October 19-21, 2006. Continuing the tradition of previous CMS conferences, we sought a balanced program containing presentations on various aspects of secure communication and multimedia systems. Special emphasis was laid on papers with direct practical relevance for the construction of secure communication systems. The selection of the program was a challenging task. In total, we received 76 submissions, from which 22 were selected for presentation as full papers. 410 0$aLecture notes in computer science ;$v4237. 410 0$aLNCS sublibrary.$nSL 4,$pSecurity and cryptology. 517 3 $aCMS 2006 606 $aComputer networks$xSecurity measures$vCongresses 606 $aTelecommunication systems$xSecurity measures$vCongresses 606 $aComputer security$vCongresses 615 0$aComputer networks$xSecurity measures 615 0$aTelecommunication systems$xSecurity measures 615 0$aComputer security 676 $a005.8 701 $aLeitold$b Herbert$f1965-$01753883 701 $aMarkatos$b Evangelos P.$f1966-$01753884 712 02$aInternational Federation for Information Processing.$bTechnical Committee 6. 712 02$aInternational Federation for Information Processing.$bTechnical Committee 11--Computer Security. 712 12$aIFIP TC6/TC11 International Conference on Communications and Multimedia Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483758403321 996 $aCommunications and multimedia security$94189945 997 $aUNINA