Conferences in DBLP
Alwyn Goh , David Ngo Chek Ling Computation of Cryptographic Keys from Face Biometrics. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:1-13 [Conf ] Heba Kamal Aslan AUTHMAC_DH: A New Protocol for Authentication and Key Distribution. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:14-26 [Conf ] Alwyn Goh , David Ngo Chek Ling Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:27-39 [Conf ] Stephen T. Kent Securing the Border Gateway Protocol: A Status Update. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:40-53 [Conf ] Alessandro Bassi , Julien Laganier Towards an IPv6-Based Security Framework for Distributed Storage Resources. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:54-64 [Conf ] Maria Papadaki , Steven Furnell , Benn Lines , Paul L. Reynolds Operational Characteristics of an Automated Intrusion Response System. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:65-75 [Conf ] Nut Taesombut , Richard Huang , P. Venkat Rangan A Secure Multimedia System in Emerging Wireless Home Networks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:76-88 [Conf ] Yusuke Sakabe , Masakazu Soshi , Atsuko Miyaji Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:89-103 [Conf ] Michelle S. Wangham , Joni da Silva Fraga , Rafael R. Obelheiro A Security Scheme for Mobile Agent Platforms in Large-Scale Systems. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:104-116 [Conf ] Thomas Rössler , Arno Hollosi Privacy and Trust in Distributed Networks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:117-131 [Conf ] Altair Olivo Santin , Joni da Silva Fraga , Carlos Maziero Extending the SDSI / SPKI Model through Federation Webs. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:132-145 [Conf ] Elisa Bertino , Elena Ferrari , Anna Cinzia Squicciarini Trust-Chi: An XML Framework for Trust Negotiations. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:146-157 [Conf ] Javier Lopez , Juan J. Ortega , Jose Vivas , José M. Troya How to Specify Security Services: A Practical Approach. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:158-171 [Conf ] Pierpaolo Baglietto , Francesco Moggia , Nicola Zingirian , Massimo Maresca Application Level Smart Card Support through Networked Mobile Devices. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:172-180 [Conf ] Alwyn Goh , Yip Wai Kuan , David Ngo Chek Ling Flexibly Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:181-193 [Conf ] Roland Norcen , Andreas Uhl Selective Encryption of the JPEG2000 Bitstream. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:194-204 [Conf ] Xiaoqiang Li , Xiangyang Xue , Wei Li Robust Spatial Data Hiding for Color Images. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:205-213 [Conf ] Werner Dietl , Andreas Uhl Watermark Security via Secret Wavelet Packet Subband Structures. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:214-225 [Conf ] David Megías , Jordi Herrera-Joancomartí , Julià Minguillón A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:226-238 [Conf ] Alwyn Goh , G. S. Poh , David Ngo Chek Ling Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:239-251 [Conf ] Bubi G. Flepp-Stars , Herbert Stögner , Andreas Uhl Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:252-263 [Conf ]