Online Library TheLib.net » Secure Information Networks: Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS’99) September 20–21, 1999, Leuven, Belgium
cover of the book Secure Information Networks: Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS’99) September 20–21, 1999, Leuven, Belgium

Ebook: Secure Information Networks: Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS’99) September 20–21, 1999, Leuven, Belgium

00
27.01.2024
4
0

This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium from September 20-21, 1999. The Conference, arrangedjointly by Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP), was organized by the Department of Electrical Engineering of the Katholieke Universiteit Leuven. The name "Communications and Multimedia Security" was used for the first time in 1995, when Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) IT Sicherheit conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The Conference aims to provide an international forum for presentations and discussions on protocols and techniques for providing secure information networks. The contributions in this volume review the state-of­ the-art in communications and multimedia security, and discuss practical of topics experiences and new developments. They cover a wide spectrum inc1uding network security, web security, protocols for entity authentication and key agreement, protocols for mobile environments, applied cryptology, watermarking, smart cards, and legal aspects of digital signatures.








Content:
Front Matter....Pages i-xi
Front Matter....Pages 1-1
Security on ATM Networks....Pages 3-20
ISDN Security Services....Pages 21-35
An Alternative Access Control Architecture for IP Over ATM Networks....Pages 36-50
Front Matter....Pages 51-51
Verifiable Democracy....Pages 53-70
Efficient Oblivious Proofs of Correct Exponentiation....Pages 71-84
Front Matter....Pages 85-85
Weaknesses in EHA Authentication and Key Distribution Protocol....Pages 87-95
Formal Design of Efficient Authentication and Key Agreement Protocols....Pages 96-113
Front Matter....Pages 115-115
On Authentication, Digital Signatures and Signature Laws....Pages 117-130
Watermarking and Secure Distribution for Encrypted Video....Pages 131-142
Implementing a Secure Log File Download Manager for the Java Card....Pages 143-159
Front Matter....Pages 161-161
Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks....Pages 163-175
Secure Distributed Virtual Conferencing....Pages 176-190
PIM-SM Security: Interdomain Issues and Solutions....Pages 191-205
Front Matter....Pages 207-207
Attacks Against the WAP WTLS Protocol....Pages 209-215
A New Authentication Protocol for Portable Communication Systems....Pages 216-230
Token Based Authentication for Handover Security....Pages 231-243
Front Matter....Pages 245-245
How to Securely Broadcast a Secret....Pages 247-257
Proofs of Work and Bread Pudding Protocols(Extended Abstract)....Pages 258-272
Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme....Pages 273-287
Front Matter....Pages 289-289
Secure Data-Transfer for Web-Based Applications....Pages 291-302
Back Matter....Pages 319-322
Using Sesame to Secure Web Based Applications on an Intranet....Pages 303-317



Content:
Front Matter....Pages i-xi
Front Matter....Pages 1-1
Security on ATM Networks....Pages 3-20
ISDN Security Services....Pages 21-35
An Alternative Access Control Architecture for IP Over ATM Networks....Pages 36-50
Front Matter....Pages 51-51
Verifiable Democracy....Pages 53-70
Efficient Oblivious Proofs of Correct Exponentiation....Pages 71-84
Front Matter....Pages 85-85
Weaknesses in EHA Authentication and Key Distribution Protocol....Pages 87-95
Formal Design of Efficient Authentication and Key Agreement Protocols....Pages 96-113
Front Matter....Pages 115-115
On Authentication, Digital Signatures and Signature Laws....Pages 117-130
Watermarking and Secure Distribution for Encrypted Video....Pages 131-142
Implementing a Secure Log File Download Manager for the Java Card....Pages 143-159
Front Matter....Pages 161-161
Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks....Pages 163-175
Secure Distributed Virtual Conferencing....Pages 176-190
PIM-SM Security: Interdomain Issues and Solutions....Pages 191-205
Front Matter....Pages 207-207
Attacks Against the WAP WTLS Protocol....Pages 209-215
A New Authentication Protocol for Portable Communication Systems....Pages 216-230
Token Based Authentication for Handover Security....Pages 231-243
Front Matter....Pages 245-245
How to Securely Broadcast a Secret....Pages 247-257
Proofs of Work and Bread Pudding Protocols(Extended Abstract)....Pages 258-272
Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme....Pages 273-287
Front Matter....Pages 289-289
Secure Data-Transfer for Web-Based Applications....Pages 291-302
Back Matter....Pages 319-322
Using Sesame to Secure Web Based Applications on an Intranet....Pages 303-317
....
Download the book Secure Information Networks: Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS’99) September 20–21, 1999, Leuven, Belgium for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen