Skip to main content
  • Book
  • © 1995

Communications and Multimedia Security

Editors:

Part of the book series: IFIP Advances in Information and Communication Technology (IFIPAICT)

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (19 chapters)

  1. Front Matter

    Pages i-viii
  2. The Puzzling Science of Information Integrity

    • Gustavus J. Simmons
    Pages 17-23
  3. Covered Trust Values in Distributed Systems

    • Birgit Borcherding, Malte Borcherding
    Pages 24-31
  4. File server architecture for an open distributed document system

    • B. Christianson, P. Hu, B. Snook, DeMontford University
    Pages 32-42
  5. A Heuristic for Securing Hypertext Systems

    • Martin S. Olivier
    Pages 43-54
  6. Video Communication — Security and Quality Issues

    • Klaus Keus, Robert Thomys
    Pages 55-65
  7. The Graphical Interface for Secure Mail

    • France Bračun, Borka Jerman-Blažič, Tomaž Klobučar, Denis Trček
    Pages 66-79
  8. The Network Security Reference Model: its Security Subjects and their Classification Criteria

    • Tetsuya Chikaraishi, Yasushi Oki, Takao Shimomura, Tadashi Ohta
    Pages 80-96
  9. Access controls for federated database environments - taxonomy of design choices

    • W. Eβmayr, F. Kastner, S. Preishuber, G. Pernul, A M. Tjoa
    Pages 117-132
  10. Authorization in Multimedia Conferencing Systems

    • E. B. Fernandez, P. D. Chien
    Pages 133-147
  11. Hidden signature schemes based on the discrete logarithm problem and related concepts

    • Patrick Horster, Markus Michels, Holger Petersen
    Pages 160-177
  12. Digital signature schemes based on Lucas functions

    • Patrick Horster, Markus Michels, Holger Petersen
    Pages 178-190
  13. Power permutations on prime residue classes

    • Fischer Harald, Stingl Christian
    Pages 191-197
  14. Hill cipher application to Multimedia Security

    • Nikitas V. Nikitakos
    Pages 198-204

About this book

This volume covers many aspects of multimedia and communications security, from national security policies to file server architectures, from hypertext documents to specialized cryptographic algorithms. It provides the interested reader with a spectrum of up-to-the-minute knowledge on the topics covered.

Editors and Affiliations

  • Institute for Applied Information Processing and Communications, Technical University of Graz, Graz, Austria

    Reinhard Posch

Bibliographic Information

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access