The SCEAS System
Navigation Menu

Conferences in DBLP

Communications and Multimedia Security (cms)
2005 (conf/cms/2005)

  1. Lubica Stanekova, Martin Stanek
    Fast Contract Signing with Batch Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:1-10 [Conf]
  2. Stefan Tillich, Johann Großschädl, Alexander Szekely
    An Instruction Set Extension for Fast and Memory-Efficient AES Implementation. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:11-21 [Conf]
  3. Germán Sáez
    Self-healing Key Distribution Schemes with Sponsorization. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:22-31 [Conf]
  4. Rolf Oppliger, Sebastian Gajek
    Effective Protection Against Phishing and Web Spoofing. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:32-41 [Conf]
  5. Paul Koster, Frank Kamperman, Peter Lenoir, Koen Vrielink
    Identity Based DRM: Personal Entertainment Domain. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:42-54 [Conf]
  6. Jaime Delgado, Víctor Torres, Silvia Llorente, Eva Rodríguez
    Rights and Trust in Multimedia Information Management. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:55-64 [Conf]
  7. Qusai Abuein, Susumu Shibusawa
    Signature Amortization Using Multiple Connected Chains. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:65-76 [Conf]
  8. Hao Yin, Chuang Lin, Feng Qiu, Xiaowen Chu, Geyong Min
    A Key Embedded Video Codec for Secure Video Multicast. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:77-87 [Conf]
  9. Fuwen Liu, Hartmut König
    Puzzle - A Novel Video Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:88-97 [Conf]
  10. Roman Pfarrhofer, Andreas Uhl
    Selective Image Encryption Using JBIG. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:98-107 [Conf]
  11. Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Pedro Comesaña Alfaro, Thierry Pun
    On Reversibility of Random Binning Techniques: Multimedia Perspectives. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:108-118 [Conf]
  12. Stefan Hetzl, Petra Mutzel
    A Graph-Theoretic Approach to Steganography. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:119-128 [Conf]
  13. André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi
    Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:129-139 [Conf]
  14. Martin Schaffer, Peter Schartner
    Video Surveillance: A Distributed Approach to Protect Privacy. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:140-149 [Conf]
  15. Liesje Demuynck, Bart De Decker
    Privacy-Preserving Electronic Health Records. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:150-159 [Conf]
  16. Wolfgang Hommel
    Using XACML for Privacy Control in SAML-Based Identity Federations. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:160-169 [Conf]
  17. Andrea Oermann, Jana Dittmann, Claus Vielhauer
    Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:170-179 [Conf]
  18. Marco Domenico Aime, Antonio Lioy, Gianluca Ramunno
    Decentralised Access Control in 802.11 Networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:180-190 [Conf]
  19. Claus Vielhauer, Tobias Scheidat
    Multimodal Biometrics for Voice and Handwriting. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:191-199 [Conf]
  20. Huafei Zhu, Feng Bao, Tieyan Li
    Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:200-209 [Conf]
  21. Udo Payer, Stefan Kraxberger
    Polymorphic Code Detection with GA Optimized Markov Models. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:210-219 [Conf]
  22. Minsoo Lee, Sehyun Park
    A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:220-229 [Conf]
  23. Wiebke Dresp
    Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:230-239 [Conf]
  24. Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen
    Assessment of Palm OS Susceptibility to Malicious Code Threats. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:240-249 [Conf]
  25. HyunGon Kim, ByeongKyun Oh
    Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:250-260 [Conf]
  26. Sascha Schimke, Athanasios Valsamakis, Claus Vielhauer, Yannis Stylianou
    Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:261-263 [Conf]
  27. Turker Akyuz, Ibrahim Sogukpinar
    INVUS: INtelligent VUlnerability Scanner. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:264-265 [Conf]
  28. Mina Deng, Lothar Fritsch, Klaus Kursawe
    Personal Rights Management- Enabling Privacy Rights in Digital Online Content. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:266-268 [Conf]
  29. Hongxia Jin, Jeffery Lotspiech
    Flexible Traitor Tracing for Anonymous Attacks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:269-270 [Conf]
  30. Fuwen Liu, Hartmut König
    Efficient Key Distribution for Closed Meetings in the Internet. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:271-272 [Conf]
  31. Taras Holotyak, Jessica J. Fridrich, Sviatoslav Voloshynovskiy
    Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:273-274 [Conf]
  32. Kwangsoo Lee, Changho Jung, Sangjin Lee, HyungJun Kim, Jongin Lim
    Applying LR Cube Analysis to JSteg Detection. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:275-276 [Conf]
  33. Enrico Hauer, Jana Dittmann, Martin Steinebach
    Digital Signatures Based on Invertible Watermarks for Video Authentication. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:277-279 [Conf]
  34. Renato Villán, Sviatoslav Voloshynovskiy, Frédéric Deguillaume, Yuriy Rytsar, Oleksiy J. Koval, Emre Topak, E. Rivera, Thierry Pun
    A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:280-281 [Conf]
  35. Huajian Liu, Lucilla Croce Ferri, Martin Steinebach
    Semantically Extended Digital Watermarking Model for Multimedia Content. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:282-283 [Conf]
  36. Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland
    An Architecture for Secure Policy Enforcement in E-Government Services Deployment. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:284-285 [Conf]
  37. Cristian Marinescu, Nicolae Tapus
    Some Critical Aspects of the PKIX TSP. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:286-288 [Conf]
  38. Antonio Lioy, Gianluca Ramunno, Marco Domenico Aime, Massimiliano Pala
    Motivations for a Theoretical Approach to WYSIWYS. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:289-290 [Conf]
  39. Lars Ewers, Wolfgang Kubbilun, Lijun Liao, Jörg Schwenk
    Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:291-300 [Conf]
  40. Ana Isabel González-Tablas Ferreres, Karel Wouters
    Integrating XML Linked Time-Stamps in OASIS Digital Signature Services. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:301-310 [Conf]
  41. Wolfgang Kubbilun, Sebastian Gajek, Michael Psarros, Jörg Schwenk
    Trustworthy Verification and Visualisation of Multiple XML-Signatures. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:311-320 [Conf]
  42. Dominik Schadow
    Experience XML Security. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:321-329 [Conf]
  43. Christian Geuer-Pollmann
    How to Make a Federation Manageable. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:330-338 [Conf]
  44. Eckehard Hermann, Dieter Kessler
    XML Signatures in an Enterprise Service Bus Environment. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:339-347 [Conf]
  45. Stephen Farrell, José Kahan
    Using the XML Key Management Specification (and Breaking X.509 Rules as You Go). [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:348-357 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002