Conferences in DBLP
Chris J. Mitchell , Namhyun Hur On the security of a structural proven signer ordering multisignature scheme. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:1-8 [Conf ] Sattam S. Al-Riyami , Chris J. Mitchell Renewing crytographic timestamps. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:9-16 [Conf ] Wolfgang Bauer Implementing elliptic curve cryptography. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:17-28 [Conf ] Yan Wang , Shuwang Lü , Zhenhua Liu A new asymmetric fingerprinting framework based on secret sharing. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:29-40 [Conf ] Mohamed Al-Ibrahim , Josef Pieprzyk Authentication of transit flows and k-siblings one-time signature. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:41-55 [Conf ] Andre Zuquete Improving the functionality of syn cookies. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:57-77 [Conf ] Tadauchi Masaharu , Ishii Tatsuei , Itoh Susumu A mac-layer security architecture for cable networks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:79-90 [Conf ] Edgar Weippl , Wolfgang Eßmayr , F. Gruber , W. Stockner , T. Trenker Towards authentication using mobile devices. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:91-105 [Conf ] Pietro Michiardi , Refik Molva Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:107-121 [Conf ] Yves Roudier , Olivier Fouache , Pierre Vannel , Refik Molva Enabling adaptive and secure extranets. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:123-135 [Conf ] Alain Pannetrat , Refik Molva Multiple layer encryption for multicast groups. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:137-153 [Conf ] Bogdan C. Popescu , Chandana Gamage , Andrew S. Tanenbaum Access control, reverse access control and replication control in a world wide distributed system. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:155-167 [Conf ] Dimitris Raptis , Theodosis Dimitrakos , Bjørn Axel Gran , Ketil Stølen The coras approach for model-based risk management applied to e-commerce domain. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:169-181 [Conf ] Dusan Gabrijelcic , Arso Savanovic , Borka Jerman-Blazic Towards security architecture for future active IP networks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:183-195 [Conf ] Martin Steinebach , Jana Dittmann , Eva Saar Combined fingerprinting attacks against digital audio watermarking: methods, results and solutions. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:197-212 [Conf ] Champskud J. Skrepth , Andreas Uhl Selective encryption of visual data. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:213-226 [Conf ] Václav Matyás Jr. , Zdenek Ríha Biometric authentication - security and usability. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:227-239 [Conf ] Arno Hollosi , Udo Payer , Reinhard Posch Automatic authentication based on the Austrian citizen card. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:241-253 [Conf ] Arno Hollosi , Herbert Leitold , Reinhard Posch An open interface enabling secure e-government. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:255-266 [Conf ] Gasper Lavrencic , Borka Jerman-Blazic , Aleksej Jerman Blazic Cadenus security considerations. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:267-278 [Conf ] Karl Scheibelhofer Validation of long-term signatures. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:279-292 [Conf ] K. Kain , Sean W. Smith , R. Asokan Digital signatures and electronic documents: a cautionary tale. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:293-308 [Conf ]