USING OMA DRM 2.0 PROTECTED CONTENT - Ogg Vorbis Protected Audio under Symbian OS (English)
- New search for: Pimenta, F.
- New search for: Serrao, C.
- New search for: Pimenta, F.
- New search for: Serrao, C.
In:
Security and cryptography; SECRYPT 2006
;
311-315
;
2006
-
ISBN:
- Conference paper / Print
-
Title:USING OMA DRM 2.0 PROTECTED CONTENT - Ogg Vorbis Protected Audio under Symbian OS
-
Contributors:Pimenta, F. ( author ) / Serrao, C. ( author )
-
Conference:International conference, Security and cryptography; SECRYPT 2006 ; 2006 ; Setubal, Portugal
-
Published in:Security and cryptography; SECRYPT 2006 ; 311-315
-
Publisher:
- New search for: INSTICC Press
-
Place of publication:Setubal
-
Publication date:2006-01-01
-
Size:5 pages
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 5
-
SECURITY ENHANCEMENT FOR A LOW COMPUTATION COST USER AUTHENTICATION SCHEMESattarzadeh, B. / Asadpour, M. / Jalili, R. et al. | 2006
- 9
-
THE ``SECUREPHONE'' - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the FlyRicci, R. / Chollet, G. / Crispino, M. V. / Jassim, S. / Koreman, J. / Morris, A. / Olivar-Dimas, M. / Garcia-Salicetti, S. / Soria-Rodriguez, P. et al. | 2006
- 17
-
PERSON VERIFICATION BY FUSION OF PROSODIC, VOICE SPECTRAL AND FACIAL PARAMETERSHernando, J. / Farrus, M. / Ejarque, P. / Garde, A. / Luque, J. et al. | 2006
- 24
-
COMPARATIVE STUDY BETWEEN BAYESIAN NETWORK AND POSSIBILISTIC NETWORK IN INTRUSION DETECTIONArfaoui, N. / Jemili, F. / Zaghdoud, M. / Ahmed, M. B. et al. | 2006
- 32
-
INTRUSION DETECTION FOR WEB APPLICATIONS (SHORT VERSION)Dagorn, N. et al. | 2006
- 40
-
SPOOFED ARP PACKETS DETECTION IN SWITCHED LAN NETWORKSTrabelsi, Z. / Shuaib, K. et al. | 2006
- 48
-
EVALUATION OF THE INTRUSION DETECTION CAPABILITIES AND PERFORMANCE OF A SECURITY OPERATION CENTERGaname, A. K. / Bourgeois, J. / Bidou, R. / Spies, F. et al. | 2006
- 56
-
WORKLOAD HIDDEN MARKOV MODEL FOR ANOMALY DETECTIONGarcia, J. M. / Navarrete, T. / Orozco, C. et al. | 2006
- 63
-
USING ATTACK GRAPHS IN AD HOC NETWORKS - For Intrusion Prediction Correlation and DetectionAzer, M. / El-Kassas, S. / El-Soudani, M. et al. | 2006
- 69
-
QUANTITATIVE ANALYSIS AND ENFORCEMENT OF THE PRINCIPLE OF LEAST PRIVILEGE IN ROLE-BASEDLai, C. / Zhang, C. N. et al. | 2006
- 75
-
ON THE SELF-SIMILARITY OF THE 1999 DARPA/LINCOLN LABORATORY EVALUATION DATAHuang, K. / Zhang, D. et al. | 2006
- 83
-
ACCESS CONTROL AND JOINT MANAGEMENT FOR COLLABORATIVE PEER GROUPSQi, W. et al. | 2006
- 87
-
PROTECTING ADAPTIVE MULTIMEDIA DELIVERY AND ADAPTATION USING PROXY BASED APPROACHKaced, A. R. / Moissinac, J.-C. et al. | 2006
- 91
-
DIGITAL PSEUDONYM IDENTITY FOR E-COMMERCEMartinez-Pelaez, R. / Rico-Novella, F. J. / Zarza-Lopez, L. A. et al. | 2006
- 99
-
A CHALLENGING BUT FEASIBLE BLOCKWISE-ADAPTIVE CHOSEN-PLAINTEXT ATTACK ON SSLBard, G. V. et al. | 2006
- 110
-
INTERNET ROUTING SECURITY: AN APPROACH TO DETECT AND TO REACT TO INCORRECT ADVERTISEMENTSFeki, I. / Zheng, X. / Achemlal, M. / Serhrouchni, A. et al. | 2006
- 118
-
LAYERED ARCHITECTURE FOR SECURE E-COMMERCE APPLICATIONSHerzberg, A. / Yoffe, I. et al. | 2006
- 126
-
TRUST MANAGEMENT WITHOUT REPUTATION IN P2P GAMESWierzbicki, A. et al. | 2006
- 135
-
PROTECTING CIPHER BLOCK CHAINING AGAINST ADAPTIVE CHOSEN PLAINTEXT ATTACKLoe, C.-W. / Khoo, K. et al. | 2006
- 141
-
FORWARD-SECURE AUTHENTICATED-ENCRYPTION IN MULTI-RECEIVER SETTINGYasuda, K. / Aoki, K. / Fujisaki, E. / Fujioka, A. et al. | 2006
- 149
-
ON THE DESIGN OF A LOW-RATE DOS ATTACK AGAINST ITERATIVE SERVERSMacia-Fernandez, G. / Diaz-Verdejo, J. E. / Garcia-Teodoro, P. et al. | 2006
- 157
-
SECURE ACCESS MODULES FOR IDENTITY PROTECTION OVER THE EAP-TLS - Smartcard Benefits for User Anonymity in Wireless InfrastructuresUrien, P. / Badra, M. et al. | 2006
- 167
-
A SERVICE DISCOVERY THREAT MODEL FOR AD HOC NETWORKSLeung, A. / Mitchell, C. et al. | 2006
- 175
-
ACTION-TRIGGERED PUBLIC-KEY SYSTEM FOR GSM USING RSA WITH PHONE-DEPENDENT ENCRYPTIONEl Nemr, R. K. / Ismail, I. A.S. / Ahmed, S. H. et al. | 2006
- 183
-
SECURITY CONSIDERATIONS IN CURRENT VOIP PROTOCOLSFries, S. et al. | 2006
- 192
-
A DOS ATTACK AGAINST THE INTEGRITY-LESS ESP (IPSEC)Nikov, V. et al. | 2006
- 203
-
COMBINATION OF A SMARTCARD E-PURSE AND E-COIN TO MAKE ELECTRONIC PAYMENTS ON THE INTERNETRuiz-Martinez, A. / Gomez-Skarmeta, A. F. / Canovas, O. et al. | 2006
- 207
-
ACHIEVING UNCONDITIONAL SECURITY IN EXISTING NETWORKS USING QUANTUM CRYPTOGRAPHYRass, S. / Sfaxi, M. A. / Ghernaouti-Helie, S. et al. | 2006
- 211
-
PROTOCOL INDEPENDENT LIGHTWEIGHT SECURE COMMUNICATIONGuvensan, M. A. / Yavuz, A. G. et al. | 2006
- 223
-
TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMSJin, H. / Lotspiech, J. / Blaum, M. et al. | 2006
- 229
-
DIGITAL OBJECT RIGHTS MANAGEMENT - Interoperable Client-side DRM MiddlewareSerrao, C. / Dias, M. / Delgado, J. et al. | 2006
- 237
-
EFFICIENT ALL-OR-NOTHING ENCRYPTION USING CTR MODEMcEvoy, R. P. / Murphy, C. C. et al. | 2006
- 246
-
PROPOSALS FOR ITERATED HASH FUNCTIONSKnudsen, L. R. / Thomsen, S. S. et al. | 2006
- 254
-
PARALLEL MULTIPLICATION IN F2n USING CONDENSED MATRIX REPRESENTATIONNegre, C. et al. | 2006
- 260
-
CHOSEN-IV STATISTICAL ATTACKS ON eSTREAM CIPHERSSaarinen, M.-J. O. et al. | 2006
- 267
-
DIGITAL CONTRACT SIGNATURE SCHEME BASED ON MULTIPLE CRYPTOSYSTEMLianhai, W. / Malek, M. et al. | 2006
- 277
-
PRIVATE BIDDING FOR MOBILE AGENTSGedrojc, B. / Cartrysse, K. / van der Lubbe, J. C.A. et al. | 2006
- 283
-
AN INFINITE PHASE-SIZE BMAP/M/1 QUEUE AND ITS APPLICATION TO SECURE GROUP COMMUNICATIONToyoizumi, H. et al. | 2006
- 289
-
ON USE OF IDENTITY-BASED ENCRYPTION FOR SECURE EMAILINGVeigner, C. / Rong, C. et al. | 2006
- 297
-
MORE ROBUST PRIVATE INFORMATIONChen, C.-H. / Horng, G. et al. | 2006
- 303
-
AN ALGORITHM FOR AUTHENTICATION OF DIGITAL IMAGESBurdescu, D. D. / Stanescu, L. et al. | 2006
- 311
-
USING OMA DRM 2.0 PROTECTED CONTENT - Ogg Vorbis Protected Audio under Symbian OSPimenta, F. / Serrao, C. et al. | 2006
- 316
-
DESIGN OF CRYPTOGRAPHIC PROTOCOLS BY MEANS OF GENETIC ALGORITHMS TECHNIQUESZarza, L. / Pegueroles, J. / Soriano, M. / Martinez, R. et al. | 2006
- 320
-
FINITE FIELD MULTIPLICATION IN LAGRANGE REPRESENTATION USING FAST FOURRIER TRANSFORMNegre, C. et al. | 2006
- 329
-
JASTEG2000 - Steganography for JPEG2000 Coded ImagesIntrona, D. / Marino, F. et al. | 2006
- 339
-
NETWORK SECURITY EVALUATION BASED ON SIMULATION OF MALFACTOR'S BEHAVIORKotenko, I. / Stepashkin, M. et al. | 2006
- 347
-
SMOOTH BLOCKS-BASED BLIND WATERMARKING ALGORITHM IN COMPRESSED DCT DOMAINQi, C. / Zhou, H. / Long, B. et al. | 2006
- 355
-
LEAST PRIVILEGE IN SEPARATION KERNELSLevin, T. E. / Irvine, C. E. / Nguyen, T. D. et al. | 2006
- 363
-
COLLABORATION SECURITY FOR MODERN INFORMATION SYSTEMSWhittaker, R. / Argote-Garcia, G. / Clarke, P. J. / Ege, R. K. et al. | 2006
- 371
-
INTER-NODE RELATIONSHIP LABELING: A FINE-GRAINED XML ACCESS CONTROL IMPLEMENTATION USING GENERIC SECURITY LABELSZhang, Z. / Rjaibi, W. et al. | 2006
- 379
-
USING MICROSOFT OFFICE INFOPATH TO GENERATE XACML POLICIESSanchez, M. / Lopez, G. / Gomez-Skarmeta, A. F. / Canovas, O. et al. | 2006
- 387
-
SECURE ONLINE ENGLISH AUCTIONSTrevathan, J. / Read, W. et al. | 2006
- 397
-
FLEXIBLE LICENSE TRANSFER SYSTEM USING MOBILE TERMINALInamura, M. / Tanaka, T. / Fujisawa, T. / Ogawa, K. / Kimura, T. et al. | 2006
- 407
-
EXTENDING XML SIGNATURE AND APPLYING IT TO WEB PAGE SIGNINGTsukuba, T. / Noguchi, K. et al. | 2006
- 413
-
SECURING WEB SERVICES USING IDENTITY-BASED ENCRYPTION (IBE)Haaland, K. A. / Rong, C. et al. | 2006
- 419
-
DEFINING VIEWPOINTS FOR SECURITY ARCHITECTURAL PATTERNSRosado, D. G. / Gutierrez, C. / Fernandez-Medina, E. / Piattini, M. et al. | 2006
- 425
-
SECURITY RISK ANALYSIS IN WEB SERVICES SYSTEMSGutierrez, C. / Fernandez-Medina, E. / Piattini, M. et al. | 2006
- 431
-
DESIGN AND IMPLEMENTATION OF A PRACTICAL SECURE DISTRIBUTED HEALTHCARE APPLICATIONGan, Z. / Varadharajan, V. et al. | 2006
- 437
-
IMPROVING SOFTWARE SECURITY THROUGH AN INTEGRATED APPROACHGan, Z. / Wei, D. / Varadharajan, V. et al. | 2006
- 443
-
A NEW (t,n) MULTI-SECRET SHARING SCHEME BASED ON LINEAR ALGEBRAHassani, S. H. / Aref, M. R. et al. | 2006
- 450
-
UNDESIRABLE AND FRAUDULENT BEHAVIOUR IN ONLINE AUCTIONSTrevathan, J. / Read, W. et al. | 2006
- 459
-
MODELLING E-BUSINESS SECURITY USING BUSINESS PROCESSESNachtigal, S. / Mitchell, C. J. et al. | 2006
- 467
-
SECURE INFORMATION SYSTEMS DEVELOPMENT - Based on a Security Requirements Engineering ProcessMellado, D. / Fernandez-Medina, E. / Piattini, M. et al. | 2006
- 471
-
AN EXTENDED ROLE-BASED ACCESS CONTROL FOR WEB SERVICESZhu, Y.-q. / Li, J.-h. / Zhang, Q.-h. et al. | 2006
- IS
-
WIRELESS COMMUNICATIONS, A NEW EMPHASIS FOR EFFECTIVE USE OF THE RADIO SPECTRUMBarclay, L. et al. | 2006
- IS
-
IT SECURITY FORENSICS: PROMISES AND SHORTCOMINGSMalek, M. et al. | 2006
- IS
-
ADVANCES IN SPEECH AND AUDIO CODING AND ITS APPLICATIONS FOR MOBILE MULTIMEDIATaleb, A. et al. | 2006
- IS
-
E-BUSINESS STRATEGY - Charting a Way through Uncertain Waters of Electronic CommerceMarca, D. A. et al. | 2006
- IS
-
REDEFINING THE MARKET PLACE: ONLY THE NUMBERS ARE DIFFERENT?Greene, T. et al. | 2006
- IS
-
MODEL-BASED SECURITY ENGINEERINGJurjens, J. et al. | 2006
- IS
-
PROJECT MANAGEMENT FOR E-BUSINESS INITIATIVES - Project Framework, Proven Practices, Coordinated Work, Focused Sub-TeamsMarca, D. A. et al. | 2006
- IS
-
MULTIMEDIA REPRESENTATION IN MPEG STANDARDS: ACHIEVEMENTS AND CHALLENGESPereira, F. et al. | 2006