LEADER 00943nam0-2200265 --450 001 9911006096003321 005 20250612090804.0 100 $a20250612d2007----kmuy0itay5050 ba 101 0 $aita 102 $aIT 105 $a 001yy 200 1 $aAlle origini del welfare contemporaneo$el'Organizzazione internazionale del lavoro tra le due guerre 1919-1939$fFranco De Felice 205 $aNuova ed. riveduta ed ampliata con il capitolo terzo inedito$f[a cura di Mario Santostasi] 210 $aRoma$cIstituto della Enciclopedia italiana$d2007 215 $a502 p.$d25 cm 225 1 $aBiblioteca dell'Enciclopedia 700 1$aDe Felice,$bFranco$f<1937-1997>$0122348 702 1$aSantostasi,$bMario 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9911006096003321 952 $a361.6 DEFE 01$b2025/666$fFLFBC 959 $aFLFBC 996 $aAlle origini del welfare contemporaneo$91227930 997 $aUNINA LEADER 07568nam 22008655 450 001 9910483203803321 005 20251226203504.0 010 $a3-540-31978-6 010 $a3-540-28791-4 024 7 $a10.1007/11552055 035 $a(CKB)1000000000213236 035 $a(SSID)ssj0000316708 035 $a(PQKBManifestationID)11258259 035 $a(PQKBTitleCode)TC0000316708 035 $a(PQKBWorkID)10276502 035 $a(PQKB)10419892 035 $a(DE-He213)978-3-540-31978-8 035 $a(MiAaPQ)EBC3068005 035 $a(PPN)123097320 035 $a(BIP)12702452 035 $a(EXLCZ)991000000000213236 100 $a20100315d2005 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCommunications and Multimedia Security $e9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings /$fedited by Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (XIII, 360 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v3677 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$aPrinted edition: 9783540287919 320 $aIncludes bibliographical references and index. 327 $aApplied Cryptography -- Fast Contract Signing with Batch Oblivious Transfer -- An Instruction Set Extension for Fast and Memory-Efficient AES Implementation -- Self-healing Key Distribution Schemes with Sponsorization -- DRM & E-Commerce -- Effective Protection Against Phishing and Web Spoofing -- Identity Based DRM: Personal Entertainment Domain -- Rights and Trust in Multimedia Information Management -- Signature Amortization Using Multiple Connected Chains -- Media Encryption -- A Key Embedded Video Codec for Secure Video Multicast -- Puzzle ? A Novel Video Encryption Algorithm -- Selective Image Encryption Using JBIG -- Multimedia Security -- On Reversibility of Random Binning Techniques: Multimedia Perspectives -- A Graph?Theoretic Approach to Steganography -- Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme -- Privacy -- Video Surveillance: A Distributed Approach to Protect Privacy -- Privacy-Preserving Electronic Health Records -- Using XACML for Privacy Control in SAML-Based Identity Federations -- Biometrics & Access Control -- Verifier-Tuple as a Classifier for Biometric Handwriting Authentication ? Combination of Syntax and Semantics -- Decentralised Access Control in 802.11 Networks -- Multimodal Biometrics for Voice and Handwriting -- Network Security -- Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks -- Polymorphic Code Detection with GA Optimized Markov Models -- A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks -- Mobile Security -- Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets -- Assessment of Palm OS Susceptibility to Malicious Code Threats -- Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication -- Work inProgress Track -- Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting -- INVUS: INtelligent VUlnerability Scanner -- Personal Rights Management? Enabling Privacy Rights in Digital Online Content -- Flexible Traitor Tracing for Anonymous Attacks -- Efficient Key Distribution for Closed Meetings in the Internet -- Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics -- Applying LR Cube Analysis to JSteg Detection -- Digital Signatures Based on Invertible Watermarks for Video Authentication -- A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents -- Semantically Extended Digital Watermarking Model for Multimedia Content -- An Architecture for Secure Policy Enforcement in E-Government Services Deployment -- Some Critical Aspects of the PKIX TSP -- Motivations for a Theoretical Approach to WYSIWYS -- Special Session: XML Security -- Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications -- Integrating XML Linked Time-Stamps in OASIS Digital Signature Services -- Trustworthy Verification and Visualisation of Multiple XML-Signatures -- Experience XML Security -- How to Make a Federation Manageable -- XML Signatures in an Enterprise Service Bus Environment -- Using the XML Key Management Specification (and Breaking X.509 Rules as You Go). 330 $aIt is our great pleasure to present the proceedings of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2005), which washeld in Salzburg on September 19-21,2005.Continuing the tradition of p- vious CMS conferences, we sought a balanced program containing presentations on various aspects of secure communication and multimedia systems. Special emphasis was laid on papers with direct practical relevance for the construction of secure communication systems. The selection of the program was a challenging task. In total, we received 143 submissions, from which 28 were selected for presentation as full papers. In addition to these regular presentations, the CMS conference featured for the ?rst time a "work in progress track" that enabled authors to report preliminary results and ongoing work. These papers were presented in the form of a poster sessionduringtheconference;anextendedabstractofthepostersappearsinthis proceedings volume. From all papers submitted to the CMS conference, the p- gramcommitteechose13 submissionsfor inclusionin theworkinprogresstrack. In addition to regular presentations, CMS 2005 featured a special session on XMLsecurity,containingbothcontributedandinvitedtalks.Thisspecialsession was jointly organized by Rudig ¨ er Grimm (TU Ilmenau, Germany) and J¨ org Schwenk (Ruhr-Universit¨ at Bochum, Germany). Their assistance in organizing CMS 2005 was greatly appreciated. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v3677 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aMultimedia systems 606 $aApplication software 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aCryptology 606 $aComputer Communication Networks 606 $aMultimedia Information Systems 606 $aComputer and Information Systems Applications 606 $aIT Operations 606 $aComputers and Society 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aMultimedia systems. 615 0$aApplication software. 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aMultimedia Information Systems. 615 24$aComputer and Information Systems Applications. 615 24$aIT Operations. 615 24$aComputers and Society. 676 $a005.8 701 $aDittmann$b Jana$01759613 701 $aKatzenbeisser$b Stefan$01704861 701 $aUhl$b Andreas$f1968-$0969128 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483203803321 996 $aCommunications and multimedia security$94198183 997 $aUNINA