Skip to main content
  • Book
  • © 2002

Advanced Communications and Multimedia Security

IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26–27, 2002, Portorož, Slovenia

Part of the book series: IFIP Advances in Information and Communication Technology (IFIPAICT, volume 100)

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (23 chapters)

  1. Front Matter

    Pages i-x
  2. Applied Cryptography

    1. Renewing Cryptographic Timestamps

      • Sattam S. Al-Riyami, Chris J. Mitchell
      Pages 9-16
    2. Implementing Elliptic Curve Cryptography

      • Wolfgang Bauer
      Pages 17-28
    3. A New Asymmetric Fingerprinting Framework Based on Secret Sharing

      • Yan Wang, Shuwang Lü, Zhenhua Liu
      Pages 29-40
    4. Authentication of Transit Flows and K-Siblings One-Time Signature

      • Mohamed Al-Ibrahim, Josef Pieprzyk
      Pages 41-55
  3. Communications Security

    1. Improving the Functionality of SYN Cookies

      • André Zúquete
      Pages 57-77
    2. A Mac-Layer Security Architecture for Cable Networks

      • Tadauchi Masaharu, Ishii Tatsuei, Itoh Susumu
      Pages 79-90
    3. Towards Authentication Using Mobile Devices

      • E. Weippl, W. Essmayr, F. Gruber, W. Stockner, T. Trenker
      Pages 91-105
    4. Enabling Adaptive and Secure Extranets

      • Yves Roudier, Olivier Fouache, Pierre Vannel, Refik Molva
      Pages 123-135
    5. Multiple Layer Encryption for Multicast Groups

      • Alain Pannetrat, Refik Molva
      Pages 137-153
  4. Distributed Systems Security

    1. Access Control, Reverse Access Control and Replication Control in a World Wide Distributed System

      • Bogdan C. Popescu, Chandana Gamage, Andrew S. Tanenbaum
      Pages 155-167
    2. The Coras Approach for Model-Based Risk Management Applied to E-Commerce Domain

      • Dimitris Raptis, Theo Dimitrakos, Bjørn Axel Gran, Ketil Stølen
      Pages 169-181
    3. Towards Security Architecture for Future Active IP Networks

      • Dusan Gabrijelčič, Arso Savanović, Borka Jerman Blažič
      Pages 183-195
  5. Multimedia Security

    1. Selective Encryption of Visual Data

      • Champskud J. Skrepth, Andreas Uhl
      Pages 213-226
    2. Biometric Authentication — Security and Usability

      • Václav Matyáš, Zdeněk Říha
      Pages 227-239
  6. Applications Security

    1. Automatic Authentication Based on the Austrian Citizen Card

      • Arno Hollosi, Udo Payer, Reinhard Posch
      Pages 241-253
    2. An Open Interface Enabling Secure E-Government

      • Arno Hollosi, Reinhard Posch, Herbert Leitold
      Pages 255-266

About this book

Advanced Communications and Multimedia Security presents a state-of-the-art review of current perspectives as well as the latest developments in the area of communications and multimedia security. It examines requirements, issues and solutions pertinent to securing information networks, and identifies future security-related research challenges. A wide spectrum of topics is discussed, including:
-Applied cryptography;
-Biometry;
-Communication systems security;
-Applications security; Mobile security;
-Distributed systems security;
-Digital watermarking and digital signatures.

This volume comprises the proceedings of the sixth Joint Working Conference on Communications and Multimedia Security (CMS'02), which was sponsored by the International Federation for Information Processing (IFIP) and held in September 2002 in Portoroz, Slovenia. It constitutes essential reading for information security specialists, researchers and professionals working in the area of computer science and communication systems.

Editors and Affiliations

  • Institut “Jožef Stefan”, Slovenia

    Borka Jerman-Blažič, Tomaž Klobučar

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access