An integrated solution for secure communications over B-ISDN (English)
Free access
- New search for: Forné, J.
- New search for: Melûs, J. L.
- New search for: Forné, J.
- New search for: Melûs, J. L.
In:
Communications and Multimedia Security II
;
96-107
;
1996
- Article/Chapter (Book) / Electronic Resource
-
Title:An integrated solution for secure communications over B-ISDN
-
Contributors:Forné, J. ( author ) / Melûs, J. L. ( author )
-
Published in:
-
Publisher:
- New search for: Springer US
-
Place of publication:Boston, MA
-
Publication date:1996-01-01
-
Size:12 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Plasma Platform for Secure Multimedia ApplicationsKrannig, A. et al. | 1996
- 13
-
High-Level Security Issues in Multimedia/Hypertext SystemsFernandez, Eduardo B. / Nair, Krishnakumar R. / Larrondo-Petrie, Maria M. / Xu, Yan et al. | 1996
- 25
-
Approaches to security in healthcare multimedia systemsFurnell, S. M. / Salmons, N. J. / Sanders, P. W. / Stockel, C. T. / Warren, M. J. et al. | 1996
- 37
-
Security Flows Analysis of the ATM Emulated LAN ArchitectureLaurent, Maryline et al. | 1996
- 53
-
Cryptanalysis of a voting schemeMichels, Markus / Horster, Patrick et al. | 1996
- 60
-
Using Workflow to Enhance Security in Federated DatabasesOlivier, Martin S. et al. | 1996
- 72
-
Anonymous Mobility Management for Third Generation Mobile NetworksHoff, S. / Jakobs, K. / Kesdogan, D. et al. | 1996
- 84
-
Security Concepts for the WWWLipp, Peter / Hassler, Vesna et al. | 1996
- 96
-
An integrated solution for secure communications over B-ISDNForné, J. / Melûs, J. L. et al. | 1996
- 108
-
Network security in a telemedicine systemVassilacopoulos, G. / Chrissikopoulos, V. / Peppes, D. et al. | 1996
- 116
-
On The Application of Image Decomposition to Image Compression and EncryptionCheng, Howard / Xiaobo, Li et al. | 1996
- 128
-
A new approach for delegation using hierarchical delegation tokensDing, Yun / Horster, Patrick / Petersen, Holger et al. | 1996
- 144
-
BEAST: A fast block cipher for arbitrary blocksizesLucks, Stefan et al. | 1996
- 154
-
A WWW based Certification Infrastructure for Secure Open Network TransactionsGustaysson, Tomas et al. | 1996
- 166
-
Distributed registration and key distribution for online universitiesOppliger, Rolf / Bracher, Martin / Albanese, Andres et al. | 1996
- 176
-
Establishing a key hierarchy for Conditional Access without encryptionSchwenk, J. et al. | 1996
- 183
-
Cybermoney in the Internet: An Overview over new Payment Systems in the InternetGrimm, Rüdiger / Zangeneh, Kambiz et al. | 1996
- 196
-
A Restrictive Blind Signature Scheme with Applications to Electronic CashRadis, C. / Govaerts, R. / Vandewalle, J. et al. | 1996
- 208
-
Secure Billing — Incontestable ChargingPiltz, S. et al. | 1996
- 222
-
ISDN LAN Access: Remote access security and user profile managementPosch, Reinhard / Leitold, Herbert / Pucher, Franz et al. | 1996
- 234
-
Secure World Wide Web access to server groupsHutchison, A. / Kaiserswerth, M. / Trommler, P. et al. | 1996
- 244
-
Access control system using dynamic handwriting featuresSchmidt, Christiane et al. | 1996
- 256
-
Is there a need for new information security models?Kokolakis, S. A. et al. | 1996
- 268
-
Attack modeling in open network environmentsKatsikas, S. K. / Gritzalis, D. / Spirakis, P. et al. | 1996
- 278
-
The Intrusion Detection System AID - Architecture, and experiences in automated audit analysisSobirey, Michael / Richter, Birk / König, Hartmut et al. | 1996
- 291
-
Defending networks: The Expert System component of SECURENETKatsikas, S. K. / Theodoropoulos, N. et al. | 1996
- 303
-
Increasing Firewall Reliability by Recording RoutesBoshoff, Paul M / Olivier, Martin S et al. | 1996