Communications and multimedia security : 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings / Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 8099. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Heidelberg : Springer, 2013Description: 1 online resource (xiv, 249 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783642407796
- 364240779X
- 3642407781
- 9783642407789
- CMS 2013
- Computer security -- Congresses
- Telecommunication systems -- Security measures -- Congresses
- Multimedia systems -- Security measures -- Congresses
- Computer security
- Computer networks
- Computer Security
- Computer Communication Networks
- Multimedia
- Sécurité informatique -- Congrès
- Systèmes de télécommunications -- Sécurité -- Mesures -- Congrès
- Multimédia -- Sécurité -- Mesures -- Congrès
- Sécurité informatique
- Réseaux d'ordinateurs
- Computer networks
- Computer security
- Telecommunication systems -- Security measures
- 005.8 23
- QA76.9.A25 I35 2013
- QA 76.9.A25
- 54.62
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Research Papers. Biometrics. Towards a Standardised Testsuite to Assess Fingerprint Matching Robustness: The StirMark Toolkit -- Cross-Feature Type Comparisons / Jutta Hämmerle-Uhl, Michael Pober and Andreas Uhl -- Achieving Anonymity against Major Face Recognition Algorithms / Benedikt Driessen and Markus Dürmuth -- Client-Side Biometric Verification Based on Trusted Computing / Jan Vossaert [and others] -- Applied Cryptography. Dedicated Hardware for Attribute-Based Credential Verification / Geoffrey Ottoy [and others] -- Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption / Y. Sreenivasa Rao and Ratna Dutta -- Work in Progress. Biometrics. Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack / Andreas Hasselberg [and others] -- Digital Watermarking, Steganography and Forensics. Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion / Huajian Liu, Yiyao Li and Martin Steinebach -- Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors / Boris Assanovich, William Puech and Iuliia Tkachenko -- Detecting Resized Double JPEG Compressed Images -- Using Support Vector Machine / Hieu Cuong Nguyen and Stefan Katzenbeisser -- Pit Stop for an Audio Steganography Algorithm / Andreas Westfeld [and others] -- Robust Hash Algorithms for Text / Martin Steinebach [and others] -- Hardware Based Security Enhanced Direct Memory Access / Marcel Eckert, Igor Podebrad and Bernd Klauer -- Social Network Privacy, Security and Authentication. Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity / Takayuki Yamada, Seiichi Gohshi and Isao Echizen -- E-Learning of IT Security Threats: A Game Prototype for Children / Jana Fruth [and others] -- Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation / Gábor György Gulyás and Sándor Imre -- An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models / Xiaofeng Xia -- Extended Abstracts. Authentication with Time Features for Keystroke Dynamics on Touchscreens / Matthias Trojahn, Florian Arndt and Frank Ortmeier -- Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans / Mario Hildebrandt [and others] -- Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications / Mario Hildebrandt [and others] -- SocACL: An ASP-Based Access Control Language for Online Social Networks / Edward Caprin and Yan Zhang -- Watermark Resynchronization: An Efficient Approach Based on Eulerian Tours around a Robust Skeleton / Konstantinos Raftopoulos [and others] -- Keynotes. Face Recognition from Degraded Images -- Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing Dictionaries / Sabah A. Jassim -- Trustworthy Software Development / Sachar Paulus, Nazila Gol Mohammadi and Thorsten Weyer.
International conference proceedings.
Includes author index.
Online resource; title from PDF title page (SpringerLink, viewed September 24, 2013).
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on biometrics; applied cryptography; digital watermarking, steganography and forensics; and social network privacy, security and authentication.
Includes author index.