Conferences in DBLP
Huafei Zhu , Feng Bao , Jianwei Liu Computing of Trust in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:1-11 [Conf ] Spyros Antonatos , Kostas G. Anagnostakis TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:12-21 [Conf ] D. Koukis , Spyros Antonatos , Kostas G. Anagnostakis On the Privacy Risks of Publishing Anonymized IP Network Traces. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:22-32 [Conf ] Heiko Rossnagel , Tobias Scherner Secure Mobile Notifications of Civilians in Case of a Disaster. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:33-42 [Conf ] Vincent Naessens , Liesje Demuynck , Bart De Decker A Fair Anonymous Submission and Review System. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:43-53 [Conf ] Isaac Agudo , Javier Lopez , José A. Montenegro Attribute Delegation Based on Ontologies and Context Information. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:54-66 [Conf ] David W. Chadwick , Sassa Otenko , Tuan-Anh Nguyen Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:67-86 [Conf ] Jeong Ok Kwon , Kouichi Sakurai , Dong Hoon Lee One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:87-96 [Conf ] Elias Athanasopoulos , Spyros Antonatos Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:97-108 [Conf ] Julien Bringer , Hervé Chabanne , Emmanuelle Dottax Perturbing and Protecting a Traceable Block Cipher. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:109-119 [Conf ] Jörg Platte , Raúl Durán Díaz , Edwin Naroska A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:120-129 [Conf ] Konstantinos Chalkias , George Stephanides Timed Release Cryptography from Bilinear Pairings Using Hash Chains. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:130-140 [Conf ] Michael Gschwandtner , Andreas Uhl , Peter Wild Compression of Encrypted Visual Data. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:141-150 [Conf ] Heinz Hofbauer , Thomas Stütz , Andreas Uhl Selective Encryption for Hierarchical MPEG. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:151-160 [Conf ] Xiangyang Luo , Chunfang Yang , Fenlin Liu Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:161-172 [Conf ] Kristof Verslype , Bart De Decker A Flexible and Open DRM Framework. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:173-184 [Conf ] Giannakis Antoniou , Campbell Wilson , Dimitris Geneiatakis PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:185-195 [Conf ] Ni (Jenny) Zhang , Chris Todd A Privacy Agent in Context-Aware Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:196-205 [Conf ] Seng-Phil Hong , Sungmin Kang Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:206-215 [Conf ] Igor V. Kotenko , Mikhail Stepashkin Attack Graph Based Evaluation of Network Security. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:216-227 [Conf ] Howard Chivers Information Modeling for Automated Risk Analysis. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:228-239 [Conf ] Andriy Panchenko , Lexi Pimenidis Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:240-251 [Conf ]