reine Buchbestellungen ab 5 Euro senden wir Ihnen Portofrei zuDiesen Artikel senden wir Ihnen ohne weiteren Aufpreis als PAKET

Communications and Multimedia Security Issues of the New Century
(Englisch)
IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS´01) May 21–22, 2001, Darmstadt, Germany
Steinmetz, Ralf & Dittmann, Jana & Steinebach, Martin

Print on Demand - Dieser Artikel wird für Sie gedruckt!

168,45 €

inkl. MwSt. · Portofrei
Dieses Produkt wird für Sie gedruckt, Lieferzeit ca. 14 Werktage
Menge:

Communications and Multimedia Security Issues of the New Century

Seiten
Erscheinungsdatum
Ausstattung
Erscheinungsjahr
Sprache
Abbildungen
Serienfolge
alternative Ausgabe
Hersteller
Vertrieb
Kategorie
Buchtyp
Warengruppenindex
Warengruppe
Detailwarengruppe
Laenge
Breite
Hoehe
Gewicht
Herkunft
Relevanz
Referenznummer
Moluna-Artikelnummer

Produktbeschreibung

The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) "IT Sicherheit" conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, the CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The CMS 1999 was held in Leuven, Belgium. This conference provides a forum for presentations and discussions on issues which combine innovative research work with a highly promising application potential in the area of security for communication and multimedia security. State-of-the-art issues as well as practical experiences and new trends in the areas were topics of interest again, as it has already been the case at previous conferences. This year, the organizers wanted to focus the attention on watermarking and copyright protection for e­ commerce applications and multimedia data. We also encompass excellent work on recent advances in cryptography and their applications. In recent years, digital media data have enormously gained in importance.

Preface. Conference Committees. Web Security. What You See Is What You Sign - Trustworthy Display of XML Documents for Signing and Verification; K. Scheibelhofer. XML Electronic Signatures; G. Karlinger. An integrated secure Web architecture for protected Mobile code distribution; M. Jalali-Sohi, et al. Secure and anonymous multicast framework; N. Weiler, B. Plattner. Vulnerabilities and Security Limitations of current IP Telephony Systems; R. Ackermann, et al. Watermarking I. Quantization Watermarking in the JPEG2000 Coding Pipeline; P. Meerwald. Theoretic Performance Analysis of a Watermarking System based on Bernoulli Chaotic Sequences; S. Tsekeridou, et al. Scalable Detection of Perceptual Watermarks in JPEG2000 Images; D. Simitopoulos, et al. Cryptographic Algorithms. Collecting randomness from the net; B. Bencsath, I. Vajda. Encryption System Based on Neutral Network; C.-K. Chan, et al. A Modified Chaotic Cryptographic Method; W. Wong, et al. An Elliptic Curve Random Number Generator; I. Lee, K. Wong. Watermarking II. Conditional and User Specific Access to Services and Resources Using Annotation Watermarks; J. Dittmann, et al. Large Scale distributed watermarking of multicast media through encryption; R. Parviainen, P. Parnes. Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept; S. Craver, S. Katzenbeisser. Fingerprints for Copyright Protection; S. Encheva. System Security. Software Security Assessment through Specification Mutations and Fault Injection; R. Kaksonen, et al. Asynchronous Large-Scale Certification Based on Certificate Verification Trees; J. Domingo-Ferrer, et al. ACLA: A Framework for Access Control List (ACL) Analysis and Optimization; J. Qian, et al. Transparent Access to Encrypted Data Using Operating System Network Stack Extensions; E. Rademer, S.D. Wolthusen. A PC Cryptographic Coprocessor Based on TI Signal Processor and Smart Card System; M. Markovic, et al. Watermarking III. Optimization of Watermarking Performances Using Error Correcting Codes and Repetition; S. Zinger, et al. Using Raw Speech as a Watermark, does it work? P. Nintanavongsa, T. Amornraksa. Multiple Security Aspects. Transferability in Coin Systems with Observers; C. Fremdt, H. Neumann. Secure iLearning; F. Graf. Tree-based Multicast Key Agreement; J. Schwenk, et al. Security for the core network of third generation mobile systems; G. Horn, et al. Secure Internet Phone; P. Horster, et al. Posters. Secure Meeting Scheduling with AgenTa; T. Herlea, et al. Virtual Hidden Network; N. Shin. Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval; R. Puertpan, et al. A Prepositioned Secret Sharing Scheme for Message Authentification in Broadcast Networks; A. Eskicioglu. Secure Service Centered Networking for Nomadic Usage; M. Hollick. Last Minute Papers. A Secure Authentication Infrastructure for Mobile Communication Services over the Internet; I. Dupre la Tour, et al. Blind Compressed-Domain Watermarking for MPEG-encoded Videos; C.-L. Wu, et al. Index of Contributors.

The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) "IT Sicherheit" conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, the CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The CMS 1999 was held in Leuven, Belgium. This conference provides a forum for presentations and discussions on issues which combine innovative research work with a highly promising application potential in the area of security for communication and multimedia security. State-of-the-art issues as well as practical experiences and new trends in the areas were topics of interest again, as it has already been the case at previous conferences. This year, the organizers wanted to focus the attention on watermarking and copyright protection for e commerce applications and multimedia data. We also encompass excellent work on recent advances in cryptography and their applications. In recent years, digital media data have enormously gained in importance.
Web Security.- What You See Is What You Sign -Trustworthy Display of XML Documents for Signing and Verification.- XML Electronic Signatures.- An integrated secure Web architecture for protected Mobile code distribution.- Secure and anonymous multicast framework.- Vulnerabilities and Security Limitations of current IP Telephony Systems.- Watermarking I.- Quantization Watermarking in the JPEG2000 Coding Pipeline.- Theoretic Performance Analysis of a Watermarking System based on Bernoulli Chaotic Sequences.- Scalable Detection of Perceptual Watermarks in JPEG2000 Images.- Cryptographic Algorithms.- Collecting randomness from the net.- Encryption System Based on Neutral Network.- A Modified Chaotic Cryptographic Method.- An Elliptic Curve Random Number Generator.- Watermarking II.- Conditional and User Specific Access to Services and Resources Using Annotation Watermarks.- Large Scale distributed watermarking of multicast media through encryption.- Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept.- Fingerprints for Copyright Protection.- System Security.- Software Security Assessment through Specification Mutations and Fault Injection.- Asynchronous Large-Scale Certification Based on Certificate Verification Trees.- ACLA: A Framework for Access Control List (ACL) Analysis and Optimization.- Transparent Access To Encrypted Data Using Operating System Network Stack Extensions.- A PC Cryptographic Coprocessor Based on TI Signal Processor And Smart Card System.- Watermarking III.- Optimization of Watermarking Performances Using Error Correcting Codes and Repetition.- Using Raw Speech as a Watermark, does it work?.- Multiple Security Aspects.- Transferability in Coin Systems with Observers.- Secure iLearning.- Tree-based Multicast KeyAgreement.- Security for the core network of third generation mobile systems.- Secure Internet Phone.- Posters.- Secure Meeting Scheduling with AgenTa.- Virtual Hidden Network.- Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval.- A Prepositioned Secret Sharing Scheme for Message Authentication in Broadcast Networks.- Secure Service Centered Networking for Nomadic Usage.- Last Minute Papers.- A Secure Authentication Infrastructure for Mobile Communication Services over the Internet.- Blind Compressed-Domain Watermarking for MPEG-encoded Videos.- Index of Contributors.
Prof. Ralf Steinmetz worked for over nine years in industrial research and development of distributed multimedia systems and applications. Since 1996 he is the head of the Multimedia Communications Lab at Darmstadt University of Technology, Germany. From 1997 to 2001 he directed the Fraunhofer (former GMD) Integrated Publishing Systems Institute IPSI in Darmstadt. In 1999 he founded the Hessian Telemedia Technology Competence Center (httc e.V.).
His thematic focus in research and teaching is on multimedia communications with his vision of real "seamless multimedia communications". With over 200 refereed publications he has become ICCC Governor in 1999; was awarded the ranking of Fellow of both, the IEEE in 1999 and the ACM in 2002.

Inhaltsverzeichnis



Preface. Conference Committees. Web Security. What You See Is What You Sign - Trustworthy Display of XML Documents for Signing and Verification; K. Scheibelhofer. XML Electronic Signatures; G. Karlinger. An integrated secure Web architecture for protected Mobile code distribution; M. Jalali-Sohi, et al. Secure and anonymous multicast framework; N. Weiler, B. Plattner. Vulnerabilities and Security Limitations of current IP Telephony Systems; R. Ackermann, et al. Watermarking I. Quantization Watermarking in the JPEG2000 Coding Pipeline; P. Meerwald. Theoretic Performance Analysis of a Watermarking System based on Bernoulli Chaotic Sequences; S. Tsekeridou, et al. Scalable Detection of Perceptual Watermarks in JPEG2000 Images; D. Simitopoulos, et al. Cryptographic Algorithms. Collecting randomness from the net; B. Bencsath, I. Vajda. Encryption System Based on Neutral Network; C.-K. Chan, et al. A Modified Chaotic Cryptographic Method; W. Wong, et al. An Elliptic Curve Random Number Generator; I. Lee, K. Wong. Watermarking II. Conditional and User Specific Access to Services and Resources Using Annotation Watermarks; J. Dittmann, et al. Large Scale distributed watermarking of multicast media through encryption; R. Parviainen, P. Parnes. Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept; S. Craver, S. Katzenbeisser. Fingerprints for Copyright Protection; S. Encheva. System Security. Software Security Assessment through Specification Mutations and Fault Injection; R. Kaksonen, et al. Asynchronous Large-Scale Certification Based on Certificate Verification Trees; J. Domingo-Ferrer, et al. ACLA: A Framework for Access Control List (ACL) Analysis and Optimization; J. Qian, et al. Transparent Access to Encrypted Data Using Operating System Network Stack Extensions; E. Rademer, S.D. Wolthusen. A PC Cryptographic Coprocessor Based on TI Signal Processor and Smart Card System; M. Markovic, et al. Watermarking III. Optimization of Watermarking Performances Using Error Correcting Codes and Repetition; S. Zinger, et al. Using Raw Speech as a Watermark, does it work? P. Nintanavongsa, T. Amornraksa. Multiple Security Aspects. Transferability in Coin Systems with Observers; C. Fremdt, H. Neumann. Secure iLearning; F. Graf. Tree-based Multicast Key Agreement; J. Schwenk, et al. Security for the core network of third generation mobile systems; G. Horn, et al. Secure Internet Phone; P. Horster, et al. Posters. Secure Meeting Scheduling with AgenTa; T. Herlea, et al. Virtual Hidden Network; N. Shin. Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval; R. Puertpan, et al. A Prepositioned Secret Sharing Scheme for Message Authentification in Broadcast Networks; A. Eskicioglu. Secure Service Centered Networking for Nomadic Usage; M. Hollick. Last Minute Papers. A Secure Authentication Infrastructure for Mobile Communication Services over the Internet; I. Dupre la Tour, et al. Blind Compressed-Domain Watermarking for MPEG-encoded Videos; C.-L. Wu, et al. Index of Contributors.


Klappentext



The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) "IT Sicherheit" conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, the CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The CMS 1999 was held in Leuven, Belgium. This conference provides a forum for presentations and discussions on issues which combine innovative research work with a highly promising application potential in the area of security for communication and multimedia security. State-of-the-art issues as well as practical experiences and new trends in the areas were topics of interest again, as it has already been the case at previous conferences. This year, the organizers wanted to focus the attention on watermarking and copyright protection for e­ commerce applications and multimedia data. We also encompass excellent work on recent advances in cryptography and their applications. In recent years, digital media data have enormously gained in importance.




Springer Book Archives



Datenschutz-Einstellungen