The SCEAS System
Navigation Menu

Conferences in DBLP

Communications and Multimedia Security (cms)
2003 (conf/cms/2003)

  1. Alwyn Goh, David Ngo Chek Ling
    Computation of Cryptographic Keys from Face Biometrics. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:1-13 [Conf]
  2. Heba Kamal Aslan
    AUTHMAC_DH: A New Protocol for Authentication and Key Distribution. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:14-26 [Conf]
  3. Alwyn Goh, David Ngo Chek Ling
    Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:27-39 [Conf]
  4. Stephen T. Kent
    Securing the Border Gateway Protocol: A Status Update. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:40-53 [Conf]
  5. Alessandro Bassi, Julien Laganier
    Towards an IPv6-Based Security Framework for Distributed Storage Resources. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:54-64 [Conf]
  6. Maria Papadaki, Steven Furnell, Benn Lines, Paul L. Reynolds
    Operational Characteristics of an Automated Intrusion Response System. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:65-75 [Conf]
  7. Nut Taesombut, Richard Huang, P. Venkat Rangan
    A Secure Multimedia System in Emerging Wireless Home Networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:76-88 [Conf]
  8. Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji
    Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:89-103 [Conf]
  9. Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro
    A Security Scheme for Mobile Agent Platforms in Large-Scale Systems. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:104-116 [Conf]
  10. Thomas Rössler, Arno Hollosi
    Privacy and Trust in Distributed Networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:117-131 [Conf]
  11. Altair Olivo Santin, Joni da Silva Fraga, Carlos Maziero
    Extending the SDSI / SPKI Model through Federation Webs. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:132-145 [Conf]
  12. Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini
    Trust-Chi: An XML Framework for Trust Negotiations. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:146-157 [Conf]
  13. Javier Lopez, Juan J. Ortega, Jose Vivas, José M. Troya
    How to Specify Security Services: A Practical Approach. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:158-171 [Conf]
  14. Pierpaolo Baglietto, Francesco Moggia, Nicola Zingirian, Massimo Maresca
    Application Level Smart Card Support through Networked Mobile Devices. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:172-180 [Conf]
  15. Alwyn Goh, Yip Wai Kuan, David Ngo Chek Ling
    Flexibly Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:181-193 [Conf]
  16. Roland Norcen, Andreas Uhl
    Selective Encryption of the JPEG2000 Bitstream. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:194-204 [Conf]
  17. Xiaoqiang Li, Xiangyang Xue, Wei Li
    Robust Spatial Data Hiding for Color Images. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:205-213 [Conf]
  18. Werner Dietl, Andreas Uhl
    Watermark Security via Secret Wavelet Packet Subband Structures. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:214-225 [Conf]
  19. David Megías, Jordi Herrera-Joancomartí, Julià Minguillón
    A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:226-238 [Conf]
  20. Alwyn Goh, G. S. Poh, David Ngo Chek Ling
    Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:239-251 [Conf]
  21. Bubi G. Flepp-Stars, Herbert Stögner, Andreas Uhl
    Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:252-263 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002