The SCEAS System
Navigation Menu

Conferences in DBLP

Communications and Multimedia Security (cms)
2006 (conf/cms/2006)

  1. Huafei Zhu, Feng Bao, Jianwei Liu
    Computing of Trust in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:1-11 [Conf]
  2. Spyros Antonatos, Kostas G. Anagnostakis
    TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:12-21 [Conf]
  3. D. Koukis, Spyros Antonatos, Kostas G. Anagnostakis
    On the Privacy Risks of Publishing Anonymized IP Network Traces. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:22-32 [Conf]
  4. Heiko Rossnagel, Tobias Scherner
    Secure Mobile Notifications of Civilians in Case of a Disaster. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:33-42 [Conf]
  5. Vincent Naessens, Liesje Demuynck, Bart De Decker
    A Fair Anonymous Submission and Review System. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:43-53 [Conf]
  6. Isaac Agudo, Javier Lopez, José A. Montenegro
    Attribute Delegation Based on Ontologies and Context Information. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:54-66 [Conf]
  7. David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen
    Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:67-86 [Conf]
  8. Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee
    One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:87-96 [Conf]
  9. Elias Athanasopoulos, Spyros Antonatos
    Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:97-108 [Conf]
  10. Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
    Perturbing and Protecting a Traceable Block Cipher. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:109-119 [Conf]
  11. Jörg Platte, Raúl Durán Díaz, Edwin Naroska
    A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:120-129 [Conf]
  12. Konstantinos Chalkias, George Stephanides
    Timed Release Cryptography from Bilinear Pairings Using Hash Chains. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:130-140 [Conf]
  13. Michael Gschwandtner, Andreas Uhl, Peter Wild
    Compression of Encrypted Visual Data. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:141-150 [Conf]
  14. Heinz Hofbauer, Thomas Stütz, Andreas Uhl
    Selective Encryption for Hierarchical MPEG. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:151-160 [Conf]
  15. Xiangyang Luo, Chunfang Yang, Fenlin Liu
    Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:161-172 [Conf]
  16. Kristof Verslype, Bart De Decker
    A Flexible and Open DRM Framework. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:173-184 [Conf]
  17. Giannakis Antoniou, Campbell Wilson, Dimitris Geneiatakis
    PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:185-195 [Conf]
  18. Ni (Jenny) Zhang, Chris Todd
    A Privacy Agent in Context-Aware Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:196-205 [Conf]
  19. Seng-Phil Hong, Sungmin Kang
    Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:206-215 [Conf]
  20. Igor V. Kotenko, Mikhail Stepashkin
    Attack Graph Based Evaluation of Network Security. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:216-227 [Conf]
  21. Howard Chivers
    Information Modeling for Automated Risk Analysis. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:228-239 [Conf]
  22. Andriy Panchenko, Lexi Pimenidis
    Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:240-251 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002