Online Library TheLib.net » Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany
cover of the book Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany

Ebook: Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany

00
27.01.2024
0
0

The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) "IT Sicherheit" conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, the CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The CMS 1999 was held in Leuven, Belgium. This conference provides a forum for presentations and discussions on issues which combine innovative research work with a highly promising application potential in the area of security for communication and multimedia security. State-of-the-art issues as well as practical experiences and new trends in the areas were topics of interest again, as it has already been the case at previous conferences. This year, the organizers wanted to focus the attention on watermarking and copyright protection for e­ commerce applications and multimedia data. We also encompass excellent work on recent advances in cryptography and their applications. In recent years, digital media data have enormously gained in importance.




This book presents a state-of-the-art review of current perspectives on communications and multimedia security. It examines requirements, issues, and solutions pertinent to securing information networks according to a multi-disciplinary approach covering research aspects, legal aspects, and applications. A wide spectrum of topics is discussed, including:
  • Web security;
  • Watermarking;
  • Cryptographic algorithms;
  • System security;
  • Mobile security;
  • Secure key protocols.
This volume contains papers presented at the fifth Joint Working Conference on Communications and Multimedia Security (CMS'01), which was sponsored by the International Federation for Information Processing (IFIP) and held on May 21-22, 2001, in Darmstadt, Germany. It constitutes essential reading for information security specialists, computer professionals, communication systems professionals, EDP managers and auditors, and researchers in the area.


This book presents a state-of-the-art review of current perspectives on communications and multimedia security. It examines requirements, issues, and solutions pertinent to securing information networks according to a multi-disciplinary approach covering research aspects, legal aspects, and applications. A wide spectrum of topics is discussed, including:
  • Web security;
  • Watermarking;
  • Cryptographic algorithms;
  • System security;
  • Mobile security;
  • Secure key protocols.
This volume contains papers presented at the fifth Joint Working Conference on Communications and Multimedia Security (CMS'01), which was sponsored by the International Federation for Information Processing (IFIP) and held on May 21-22, 2001, in Darmstadt, Germany. It constitutes essential reading for information security specialists, computer professionals, communication systems professionals, EDP managers and auditors, and researchers in the area.
Content:
Front Matter....Pages i-xi
Front Matter....Pages 1-1
What You See Is What You Sign....Pages 3-13
XML Electronic Signatures....Pages 15-23
An Integrated Secure Web Architecture For Protected Mobile Code Distribution....Pages 25-37
Secure and Anonymous Multicast Framework....Pages 39-51
Vulnerabilities and Security Limitations of Current IP Telephony Systems....Pages 53-66
Front Matter....Pages 67-67
Quantization Watermarking in the JPEG2000 Coding Pipeline....Pages 69-79
Theoretic Performance Analysis of a Watermarking System Based on Bernoulli Chaotic Sequences....Pages 81-91
Scalable Detection of Perceptual Watermarks in JPEG2000 Images....Pages 93-102
Front Matter....Pages 103-103
Collecting Randomness from the Net....Pages 105-115
Encryption System Based On Neural Network....Pages 117-122
A Modified Chaotic Cryptographic Method....Pages 123-126
An Elliptic Curve Random Number Generator....Pages 127-133
Front Matter....Pages 135-135
Conditional and User Specific Access to Services and Resources using Annotation Watermarks....Pages 137-148
Large Scale Distributed Watermarking of Multicast Media Through Encryption....Pages 149-158
Copyright Protection Protocols Based on Asymmetric Watermarking....Pages 159-170
Front Matter....Pages 171-171
Software Security Assessment through Specification Mutations and Fault Injection....Pages 173-183
Asynchronous Large-Scale Certification Based on Certificate Verification Trees....Pages 185-196
ACLA: A Framework for Access Control List (ACL) Analysis and Optimization....Pages 197-211
Transparent Access to Encrypted Data Using Operating System Network Stack Extensions....Pages 213-226
Front Matter....Pages 227-227
Optimization of Watermarking Performances Using Error Correcting Codes and Repetition....Pages 229-240
Front Matter....Pages 227-227
Using Raw Speech as a Watermark, Does it Work?....Pages 241-251
Front Matter....Pages 253-253
Transferability in Coin Systems with Observers....Pages 255-265
Secure Ilearning....Pages 267-281
Tree-Based Multicast Key Agreement....Pages 283-295
Security for the core network of third generation mobile systems....Pages 297-312
Secure Internet Phone....Pages 313-324
Front Matter....Pages 325-325
Secure Meeting Scheduling with Agenta....Pages 327-338
Virtual Hidden Network....Pages 339-349
Gaussian Pixel Weighting Marks in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval....Pages 351-361
A Prepositioned Secret Sharing Scheme for Message Authentication in Broadcast Networks....Pages 363-373
Secure Service Centered Networking for Nomadic Usage....Pages 375-380
Front Matter....Pages 381-381
A PC Cryptographic Coprocessor Based on TI Signal Processor and Smart Card System....Pages 383-393
Fingerprints for Copyright Protection....Pages 395-404
A Secure Authentication Infrastructure for Mobile Communication Services over the Internet....Pages 405-415
Blind Compressed-Domain Watermarking for MPEG-Encoded Videos....Pages 417-427
Back Matter....Pages 428-428


This book presents a state-of-the-art review of current perspectives on communications and multimedia security. It examines requirements, issues, and solutions pertinent to securing information networks according to a multi-disciplinary approach covering research aspects, legal aspects, and applications. A wide spectrum of topics is discussed, including:
  • Web security;
  • Watermarking;
  • Cryptographic algorithms;
  • System security;
  • Mobile security;
  • Secure key protocols.
This volume contains papers presented at the fifth Joint Working Conference on Communications and Multimedia Security (CMS'01), which was sponsored by the International Federation for Information Processing (IFIP) and held on May 21-22, 2001, in Darmstadt, Germany. It constitutes essential reading for information security specialists, computer professionals, communication systems professionals, EDP managers and auditors, and researchers in the area.
Content:
Front Matter....Pages i-xi
Front Matter....Pages 1-1
What You See Is What You Sign....Pages 3-13
XML Electronic Signatures....Pages 15-23
An Integrated Secure Web Architecture For Protected Mobile Code Distribution....Pages 25-37
Secure and Anonymous Multicast Framework....Pages 39-51
Vulnerabilities and Security Limitations of Current IP Telephony Systems....Pages 53-66
Front Matter....Pages 67-67
Quantization Watermarking in the JPEG2000 Coding Pipeline....Pages 69-79
Theoretic Performance Analysis of a Watermarking System Based on Bernoulli Chaotic Sequences....Pages 81-91
Scalable Detection of Perceptual Watermarks in JPEG2000 Images....Pages 93-102
Front Matter....Pages 103-103
Collecting Randomness from the Net....Pages 105-115
Encryption System Based On Neural Network....Pages 117-122
A Modified Chaotic Cryptographic Method....Pages 123-126
An Elliptic Curve Random Number Generator....Pages 127-133
Front Matter....Pages 135-135
Conditional and User Specific Access to Services and Resources using Annotation Watermarks....Pages 137-148
Large Scale Distributed Watermarking of Multicast Media Through Encryption....Pages 149-158
Copyright Protection Protocols Based on Asymmetric Watermarking....Pages 159-170
Front Matter....Pages 171-171
Software Security Assessment through Specification Mutations and Fault Injection....Pages 173-183
Asynchronous Large-Scale Certification Based on Certificate Verification Trees....Pages 185-196
ACLA: A Framework for Access Control List (ACL) Analysis and Optimization....Pages 197-211
Transparent Access to Encrypted Data Using Operating System Network Stack Extensions....Pages 213-226
Front Matter....Pages 227-227
Optimization of Watermarking Performances Using Error Correcting Codes and Repetition....Pages 229-240
Front Matter....Pages 227-227
Using Raw Speech as a Watermark, Does it Work?....Pages 241-251
Front Matter....Pages 253-253
Transferability in Coin Systems with Observers....Pages 255-265
Secure Ilearning....Pages 267-281
Tree-Based Multicast Key Agreement....Pages 283-295
Security for the core network of third generation mobile systems....Pages 297-312
Secure Internet Phone....Pages 313-324
Front Matter....Pages 325-325
Secure Meeting Scheduling with Agenta....Pages 327-338
Virtual Hidden Network....Pages 339-349
Gaussian Pixel Weighting Marks in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval....Pages 351-361
A Prepositioned Secret Sharing Scheme for Message Authentication in Broadcast Networks....Pages 363-373
Secure Service Centered Networking for Nomadic Usage....Pages 375-380
Front Matter....Pages 381-381
A PC Cryptographic Coprocessor Based on TI Signal Processor and Smart Card System....Pages 383-393
Fingerprints for Copyright Protection....Pages 395-404
A Secure Authentication Infrastructure for Mobile Communication Services over the Internet....Pages 405-415
Blind Compressed-Domain Watermarking for MPEG-Encoded Videos....Pages 417-427
Back Matter....Pages 428-428
....
Download the book Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen