The SCEAS System
Navigation Menu

Conferences in DBLP

Communications and Multimedia Security (cms)
1996 (conf/cms/1996)

  1. A. Kranning
    PLASMA: Platform for Secure Multimedia Applications. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:1-12 [Conf]
  2. Eduardo B. Fernández, Krishnakumar R. Nair, María M. Larrondo-Petrie, Yan Xu
    High-Level Security Issues in Multimedia/Hypertext Systems. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:13-24 [Conf]
  3. Steven Furnell, Nichola Jane Salmons, Peter W. Sanders, Colin T. Stockel, Matthew J. Warren
    Approaches to Security in Healthcare Multimedia Systems. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:25-36 [Conf]
  4. Maryline Laurent
    Security Flows Analysis of the ATM Emulated LAN Architecture. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:37-52 [Conf]
  5. Markus Michels, Patrick Horster
    Cryptanalysis of a Voting Scheme. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:53-59 [Conf]
  6. Martin S. Olivier
    Using Workflow to Enhance Security in Federated Databases. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:60-71 [Conf]
  7. Simon Hoff, Kai Jakobs, Dogan Kesdogan
    Anonymous Mobility Management for Third Generation Mobile Networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:72-83 [Conf]
  8. Peter Lipp, Vesna Hassler
    Security Concepts for the WWW. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:84-95 [Conf]
  9. Jordi Forné, José L. Melús
    An Integrated Solution for Secure Communications over B-ISDN. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:96-107 [Conf]
  10. G. Vassilacopoulos, Vassilios Chrissikopoulos, D. Peppes
    Network Security in a Telemedicine System. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:108-115 [Conf]
  11. Howard Cheng, Xiaobo Li
    On the Application of Image Decomposition to Image Compression. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:116-127 [Conf]
  12. Yun Ding, Patrick Horster, Holger Petersen
    A New Approach for Delegation Using Hierarchical Delegation Tokens. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:128-143 [Conf]
  13. Stefan Lucks
    BEAST: A Fast Block Cipher for Arbitrary Blocksizes. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:144-153 [Conf]
  14. Tomas Gustavsson
    A WWW Based Certification Infrastructure for Secure Open Network Transactions. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:154-165 [Conf]
  15. Rolf Oppliger, Martin Bracher
    Distributed Registration and Key Distribution for Online Universities. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:166-175 [Conf]
  16. Jörg Schwenk
    Establishing a Key Hierarchy for Conditional Access without Encryption. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:176-182 [Conf]
  17. Rüdiger Grimm, Kambiz Zangeneh
    Cybermoney in the Internet: An Overview over new Payment Systems in the Internet. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:183-195 [Conf]
  18. Cristian Radu, René Govaerts, Joos Vandewalle
    A Restrictive Blind Signature Scheme with Applications to Electronic Cash. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:196-207 [Conf]
  19. Stefan Pütz
    Secure Billing - Incontestable Charging. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:208-221 [Conf]
  20. Reinhard Posch, Herbert Leitold, Franz Pucher
    ISDN LAN Access: Remote Access Security and User Profile Management. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:222-233 [Conf]
  21. A. Hutchison, Matthias Kaiserswerth, Peter Trommler
    Secure World Wide Web Access to Server Groups. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:234-243 [Conf]
  22. Christiane Schmidt
    Access Control System Using Dynamic Handwriting Features. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:244-255 [Conf]
  23. Spyros Kokolakis
    Is there a Need for New Information Security Models? [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:256-267 [Conf]
  24. Sokratis K. Katsikas, Dimitris Gritzalis, Paul G. Spirakis
    Attack Modelling in Open Network Environments. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:268-277 [Conf]
  25. Michael Sobirey, Birk Richter, Hartmut König
    The Intrusion Detection System AID - Architecture, and Experiences in Automated Audit Analysis. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:278-290 [Conf]
  26. Sokratis K. Katsikas, N. Theodoropoulos
    Defending Networks: The Expert System Components of SECURENET. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:291-302 [Conf]
  27. Paul M. Boshoff, Martin S. Olivier
    Increasing Firewall Reliability by Recording Routes. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:303-314 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002