The SCEAS System
Navigation Menu

Conferences in DBLP

Communications and Multimedia Security (cms)
2001 (conf/cms/2001)

  1. Roland Parviainen, Peter Parnes
    Large Scale distributed watermarking of multicast media through encryption. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  2. F. Graf
    Secure iLearning. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  3. T. Herlea, Joris Claessens, Danny De Cock, Bart Preneel, Joos Vandewalle
    Secure Meeting Scheduling with agenTA. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  4. Alexander Herrigel, Sviatoslav Voloshynovskiy
    Counterfeit Attacks against a new Currency Protection Scheme. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  5. P. Nintanavongsa, Thumrongrat Amornraksa
    Using Raw Speeck as a Watermark, does it work? [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  6. Matthias Hollick
    Secure Service Centered Networking for Nomadic Usage. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  7. Rapee Puertpan
    Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  8. J. Qian
    ACLA: A framework for Access Control List (ACL) Analysis and Optimization. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  9. E. Rademer, Stephen D. Wolthusen
    Transparent Access To Encrypted Data Using Operating System Network Stack Extensions. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  10. Karl Scheibelhofer
    What You See Is What You Sign - Trustworthy Display of XML Documents for Signing and Verification. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  11. Roland Schmitz
    Security for the core network of third generation mobile systems. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  12. N. Shin
    Virtual Hidden Network. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  13. Dimitrios Simitopoulos, Nikolaos V. Boulgouris, Athanasios Leontaris, Michael G. Strintzis
    Scalable Detection of Perceptual Watermarks in JPEG2000 Images. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  14. Sofia Tsekeridou, Vassilios Solachidis, Nikos Nikolaidis, Athanasios Nikolaidis, Anastasios Tefas, Ioannis Pitas
    Theoretic Performance Analysis of a Watermarking System based on Bernoulli Chaotic Sequences. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  15. Nathalie Weiler, Bernhard Plattner
    Secure and anonymous multicast framework. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  16. W. Wong, L. Lee, K. Wong
    A Modified Chaotic Cryptographic Method. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  17. Peter Meerwald
    Quantization Watermarking in the JPEG2000 Coding Pipeline. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  18. Tobias Martin, R. Schaffelhofer, Jörg Schwenk
    Tree-based Key Agreement for Multicast. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  19. Milan Markovic, Z. Savic, Zeljko Obrenovic, A. Nikolic
    A PC Cryptographic Coprocessor based on TI Signal Processor and Smart Card System. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  20. Patrick Horster, Martin Schaffer, Peter Schartner, Dieter Sommer
    Secure Internet Phone. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  21. Ralf Ackermann, Markus Schumacher, Utz Roedig, Ralf Steinmetz
    Vulnerabilities and Security Limitations of current IP Telephony Systems. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  22. Mehrdad Jalali
    An integrated secure Web architecture for protected mobile code distribution. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  23. M. Mar Albà, Josep Domingo-Ferrer, Francesc Sebé
    Asynchronous Large-Scale Certification Based on Certificate Verification Trees. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  24. Rauli Kaksonen, M. Laakso, A. Takanen
    System Security Assessment through Specification Mutations and Fault Injection. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  25. G. Karlinger
    Deployment of Electronic Signatures in the XML world according to the international standard XML Signature Syntax and Processing. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  26. Stefan Katzenbeisser, Scott Craver
    Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  27. B. Bencsath, I. Vajda
    Collecting randomness from the net. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  28. Choi-Kuen Chan, Chi-Kwong Chan, Lee-Ming Cheng
    Encryption System Based on Neutral Network. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  29. L. Lee, K. Wong
    An Elliptic Curve Random Number Generator. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  30. Wennung Lie, Chih-Liang Wu
    Blind Compressed-Domain Watermarking for MPEG-Encoded Videos. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  31. Jana Dittmann, Petra Wohlmacher, Ralf Ackermann
    Conditional Access for Business and M-Commerce Applications using Annotation Watermarks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  32. Sylvia B. Encheva
    Fingerprints for Copyright Protection. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  33. Ahmet M. Eskicioglu
    A Key Transport Protocol Based on Secret Sharing - An Application to Message Authentication. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  34. C. Fremidt
    Transferability in Coin Systems with Observers. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  35. S. Zinger, Z. Jin, Henri Maître, Bülent Sankur
    Optimization of Watermarking Performances Using Error Correcting Codes and Repetition. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002