Conferences in DBLP
Lubica Stanekova , Martin Stanek Fast Contract Signing with Batch Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:1-10 [Conf ] Stefan Tillich , Johann Großschädl , Alexander Szekely An Instruction Set Extension for Fast and Memory-Efficient AES Implementation. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:11-21 [Conf ] Germán Sáez Self-healing Key Distribution Schemes with Sponsorization. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:22-31 [Conf ] Rolf Oppliger , Sebastian Gajek Effective Protection Against Phishing and Web Spoofing. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:32-41 [Conf ] Paul Koster , Frank Kamperman , Peter Lenoir , Koen Vrielink Identity Based DRM: Personal Entertainment Domain. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:42-54 [Conf ] Jaime Delgado , Víctor Torres , Silvia Llorente , Eva Rodríguez Rights and Trust in Multimedia Information Management. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:55-64 [Conf ] Qusai Abuein , Susumu Shibusawa Signature Amortization Using Multiple Connected Chains. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:65-76 [Conf ] Hao Yin , Chuang Lin , Feng Qiu , Xiaowen Chu , Geyong Min A Key Embedded Video Codec for Secure Video Multicast. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:77-87 [Conf ] Fuwen Liu , Hartmut König Puzzle - A Novel Video Encryption Algorithm. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:88-97 [Conf ] Roman Pfarrhofer , Andreas Uhl Selective Image Encryption Using JBIG. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:98-107 [Conf ] Sviatoslav Voloshynovskiy , Oleksiy J. Koval , Emre Topak , José-Emilio Vila-Forcén , Pedro Comesaña Alfaro , Thierry Pun On Reversibility of Random Binning Techniques: Multimedia Perspectives. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:108-118 [Conf ] Stefan Hetzl , Petra Mutzel A Graph-Theoretic Approach to Steganography. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:119-128 [Conf ] André Adelsbach , Markus Rohe , Ahmad-Reza Sadeghi Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:129-139 [Conf ] Martin Schaffer , Peter Schartner Video Surveillance: A Distributed Approach to Protect Privacy. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:140-149 [Conf ] Liesje Demuynck , Bart De Decker Privacy-Preserving Electronic Health Records. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:150-159 [Conf ] Wolfgang Hommel Using XACML for Privacy Control in SAML-Based Identity Federations. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:160-169 [Conf ] Andrea Oermann , Jana Dittmann , Claus Vielhauer Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:170-179 [Conf ] Marco Domenico Aime , Antonio Lioy , Gianluca Ramunno Decentralised Access Control in 802.11 Networks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:180-190 [Conf ] Claus Vielhauer , Tobias Scheidat Multimodal Biometrics for Voice and Handwriting. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:191-199 [Conf ] Huafei Zhu , Feng Bao , Tieyan Li Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:200-209 [Conf ] Udo Payer , Stefan Kraxberger Polymorphic Code Detection with GA Optimized Markov Models. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:210-219 [Conf ] Minsoo Lee , Sehyun Park A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:220-229 [Conf ] Wiebke Dresp Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:230-239 [Conf ] Tom Goovaerts , Bart De Win , Bart De Decker , Wouter Joosen Assessment of Palm OS Susceptibility to Malicious Code Threats. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:240-249 [Conf ] HyunGon Kim , ByeongKyun Oh Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:250-260 [Conf ] Sascha Schimke , Athanasios Valsamakis , Claus Vielhauer , Yannis Stylianou Biometrics: Different Approaches for Using Gaussian Mixture Models in Handwriting. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:261-263 [Conf ] Turker Akyuz , Ibrahim Sogukpinar INVUS: INtelligent VUlnerability Scanner. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:264-265 [Conf ] Mina Deng , Lothar Fritsch , Klaus Kursawe Personal Rights Management- Enabling Privacy Rights in Digital Online Content. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:266-268 [Conf ] Hongxia Jin , Jeffery Lotspiech Flexible Traitor Tracing for Anonymous Attacks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:269-270 [Conf ] Fuwen Liu , Hartmut König Efficient Key Distribution for Closed Meetings in the Internet. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:271-272 [Conf ] Taras Holotyak , Jessica J. Fridrich , Sviatoslav Voloshynovskiy Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:273-274 [Conf ] Kwangsoo Lee , Changho Jung , Sangjin Lee , HyungJun Kim , Jongin Lim Applying LR Cube Analysis to JSteg Detection. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:275-276 [Conf ] Enrico Hauer , Jana Dittmann , Martin Steinebach Digital Signatures Based on Invertible Watermarks for Video Authentication. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:277-279 [Conf ] Renato Villán , Sviatoslav Voloshynovskiy , Frédéric Deguillaume , Yuriy Rytsar , Oleksiy J. Koval , Emre Topak , E. Rivera , Thierry Pun A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:280-281 [Conf ] Huajian Liu , Lucilla Croce Ferri , Martin Steinebach Semantically Extended Digital Watermarking Model for Multimedia Content. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:282-283 [Conf ] Nikolaos Oikonomidis , Sergiu Tcaciuc , Christoph Ruland An Architecture for Secure Policy Enforcement in E-Government Services Deployment. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:284-285 [Conf ] Cristian Marinescu , Nicolae Tapus Some Critical Aspects of the PKIX TSP. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:286-288 [Conf ] Antonio Lioy , Gianluca Ramunno , Marco Domenico Aime , Massimiliano Pala Motivations for a Theoretical Approach to WYSIWYS. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:289-290 [Conf ] Lars Ewers , Wolfgang Kubbilun , Lijun Liao , Jörg Schwenk Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:291-300 [Conf ] Ana Isabel González-Tablas Ferreres , Karel Wouters Integrating XML Linked Time-Stamps in OASIS Digital Signature Services. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:301-310 [Conf ] Wolfgang Kubbilun , Sebastian Gajek , Michael Psarros , Jörg Schwenk Trustworthy Verification and Visualisation of Multiple XML-Signatures. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:311-320 [Conf ] Dominik Schadow Experience XML Security. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:321-329 [Conf ] Christian Geuer-Pollmann How to Make a Federation Manageable. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:330-338 [Conf ] Eckehard Hermann , Dieter Kessler XML Signatures in an Enterprise Service Bus Environment. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:339-347 [Conf ] Stephen Farrell , José Kahan Using the XML Key Management Specification (and Breaking X.509 Rules as You Go). [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:348-357 [Conf ]