Online Library TheLib.net » Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdom
cover of the book Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdom

Ebook: Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdom

00
27.01.2024
0
0

International Federation for Information Processing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

For more information about the 300 other books in the IFIP series, please visit springeronline.com.




International Federation for Information Processing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction.  Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured.  These results often precede journal publication and represent the most current research.  The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

 

For more information about the 300 other books in the IFIP series, please visit springeronline.com.




International Federation for Information Processing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction.  Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured.  These results often precede journal publication and represent the most current research.  The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

 

For more information about the 300 other books in the IFIP series, please visit springeronline.com.


Content:
Front Matter....Pages i-xiii
Duo-Onions and Hydra-Onions — Failure and Adversary Resistant Onion Protocols....Pages 1-15
Personal Attributes and Privacy....Pages 17-29
Local Management of Credits and Debits in Mobile Ad Hoc Networks....Pages 31-45
How Secure are Current Mobile Operating Systems?....Pages 47-58
An Overview of Security Issues and Techniques in Mobile Agents....Pages 59-78
A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography....Pages 79-95
Mobile Trust Negotiation....Pages 97-109
Weak Context Establishment Procedure for Mobility and Multi-Homing Management....Pages 111-123
A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components....Pages 125-130
Threat Modelling for Web Services Based Web Applications....Pages 131-144
Threat Modelling for ASP.NET....Pages 145-158
Threat Modelling for SQL Servers....Pages 159-171
Threat Modelling for Active Directory....Pages 173-182
Threat Modelling for Security Tokens in Web Applications....Pages 183-193
Analysis of the DVB Common Scrambling Algorithm....Pages 195-207
An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder....Pages 209-221
Robust Visual Hashing Using JPEG 2000....Pages 223-235
A System for End-to-End Authentication of Adaptive Multimedia Content....Pages 237-249
Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure....Pages 251-261
Secure Role Based Messaging....Pages 263-275
Back Matter....Pages 289-289
Five Non-Technical Pillars of Network Information Security Management....Pages 277-287


International Federation for Information Processing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction.  Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured.  These results often precede journal publication and represent the most current research.  The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

 

For more information about the 300 other books in the IFIP series, please visit springeronline.com.


Content:
Front Matter....Pages i-xiii
Duo-Onions and Hydra-Onions — Failure and Adversary Resistant Onion Protocols....Pages 1-15
Personal Attributes and Privacy....Pages 17-29
Local Management of Credits and Debits in Mobile Ad Hoc Networks....Pages 31-45
How Secure are Current Mobile Operating Systems?....Pages 47-58
An Overview of Security Issues and Techniques in Mobile Agents....Pages 59-78
A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography....Pages 79-95
Mobile Trust Negotiation....Pages 97-109
Weak Context Establishment Procedure for Mobility and Multi-Homing Management....Pages 111-123
A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Components....Pages 125-130
Threat Modelling for Web Services Based Web Applications....Pages 131-144
Threat Modelling for ASP.NET....Pages 145-158
Threat Modelling for SQL Servers....Pages 159-171
Threat Modelling for Active Directory....Pages 173-182
Threat Modelling for Security Tokens in Web Applications....Pages 183-193
Analysis of the DVB Common Scrambling Algorithm....Pages 195-207
An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder....Pages 209-221
Robust Visual Hashing Using JPEG 2000....Pages 223-235
A System for End-to-End Authentication of Adaptive Multimedia Content....Pages 237-249
Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure....Pages 251-261
Secure Role Based Messaging....Pages 263-275
Back Matter....Pages 289-289
Five Non-Technical Pillars of Network Information Security Management....Pages 277-287
....
Download the book Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdom for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen