Patrick Horster (Ed.):
Communications and Multimedia Security II, Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security at Essen, Germany, 23-24 September 1996.
IFIP Conference Proceedings 70 Chapman & Hall 1996, ISBN 0-412-79780-1 BibTeX
@proceedings{DBLP:conf/cms/1996,
editor = {Patrick Horster},
title = {Communications and Multimedia Security II, Proceedings of the
IFIP TC6/TC11 International Conference on Communications and
Multimedia Security at Essen, Germany, 23-24 September 1996},
booktitle = {Communications and Multimedia Security},
publisher = {Chapman {\&} Hall},
series = {IFIP Conference Proceedings},
volume = {70},
year = {1996},
isbn = {0-412-79780-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- A. Kranning:
PLASMA: Platform for Secure Multimedia Applications.
1-12 BibTeX
- Eduardo B. Fernández, Krishnakumar R. Nair, María M. Larrondo-Petrie, Yan Xu:
High-Level Security Issues in Multimedia/Hypertext Systems.
13-24 BibTeX
- Steven Furnell, Nichola Jane Salmons, Peter W. Sanders, Colin T. Stockel, Matthew J. Warren:
Approaches to Security in Healthcare Multimedia Systems.
25-36 BibTeX
- Maryline Laurent:
Security Flows Analysis of the ATM Emulated LAN Architecture.
37-52 BibTeX
- Markus Michels, Patrick Horster:
Cryptanalysis of a Voting Scheme.
53-59 BibTeX
- Martin S. Olivier:
Using Workflow to Enhance Security in Federated Databases.
60-71 BibTeX
- Simon Hoff, Kai Jakobs, Dogan Kesdogan:
Anonymous Mobility Management for Third Generation Mobile Networks.
72-83 BibTeX
- Peter Lipp, Vesna Hassler:
Security Concepts for the WWW.
84-95 BibTeX
- Jordi Forné, José L. Melús:
An Integrated Solution for Secure Communications over B-ISDN.
96-107 BibTeX
- George Vassilacopoulos, Vassilios Chrissikopoulos, D. Peppes:
Network Security in a Telemedicine System.
108-115 BibTeX
- Howard Cheng, Xiaobo Li:
On the Application of Image Decomposition to Image Compression.
116-127 BibTeX
- Yun Ding, Patrick Horster, Holger Petersen:
A New Approach for Delegation Using Hierarchical Delegation Tokens.
128-143 BibTeX
- Stefan Lucks:
BEAST: A Fast Block Cipher for Arbitrary Blocksizes.
144-153 BibTeX
- Tomas Gustavsson:
A WWW Based Certification Infrastructure for Secure Open Network Transactions.
154-165 BibTeX
- Rolf Oppliger, Martin Bracher:
Distributed Registration and Key Distribution for Online Universities.
166-175 BibTeX
- Jörg Schwenk:
Establishing a Key Hierarchy for Conditional Access without Encryption.
176-182 BibTeX
- Rüdiger Grimm, Kambiz Zangeneh:
Cybermoney in the Internet: An Overview over new Payment Systems in the Internet.
183-195 BibTeX
- Cristian Radu, René Govaerts, Joos Vandewalle:
A Restrictive Blind Signature Scheme with Applications to Electronic Cash.
196-207 BibTeX
- Stefan Pütz:
Secure Billing - Incontestable Charging.
208-221 BibTeX
- Reinhard Posch, Herbert Leitold, Franz Pucher:
ISDN LAN Access: Remote Access Security and User Profile Management.
222-233 BibTeX
- A. Hutchison, Matthias Kaiserswerth, Peter Trommler:
Secure World Wide Web Access to Server Groups.
234-243 BibTeX
- Christiane Schmidt:
Access Control System Using Dynamic Handwriting Features.
244-255 BibTeX
- Spyros Kokolakis:
Is there a Need for New Information Security Models?
256-267 BibTeX
- Sokratis K. Katsikas, Dimitris Gritzalis, Paul G. Spirakis:
Attack Modelling in Open Network Environments.
268-277 BibTeX
- Michael Sobirey, Birk Richter, Hartmut König:
The Intrusion Detection System AID - Architecture, and Experiences in Automated Audit Analysis.
278-290 BibTeX
- Sokratis K. Katsikas, N. Theodoropoulos:
Defending Networks: The Expert System Components of SECURENET.
291-302 BibTeX
- Paul M. Boshoff, Martin S. Olivier:
Increasing Firewall Reliability by Recording Routes.
303-314 BibTeX
Copyright © Sat May 16 23:02:39 2009
by Michael Ley (ley@uni-trier.de)