B-ISDN user plane confidentiality by ATM cell stream intercepting encryption (English)
Free access
- New search for: Leitold, Herbert
- New search for: Posch, Reinhard
- New search for: Leitold, Herbert
- New search for: Posch, Reinhard
In:
Communications and Multimedia Security
;
155-166
;
1997
- Article/Chapter (Book) / Electronic Resource
-
Title:B-ISDN user plane confidentiality by ATM cell stream intercepting encryption
-
Contributors:Leitold, Herbert ( author ) / Posch, Reinhard ( author )
-
Published in:Communications and Multimedia Security ; 155-166
-
Publisher:
- New search for: Springer US
-
Place of publication:Boston, MA
-
Publication date:1997-01-01
-
Size:12 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Overall Integrity of Service Control in TINA NetworksStaamann, S. et al. | 1997
- 16
-
Implementing security at the external interfaces of TMNsAndrianopoulos, George / Ganivet, Nicolas / Hofseth, Lars / Maillot, Dominique / Ølnes, Jon / Strick, Linda et al. | 1997
- 33
-
Addressing Threats and Security Issues in World Wide Web TechnologyGritzalis, Stefanos / Spinellis, Diomidis et al. | 1997
- 47
-
A Framework and Prototyping Environment for a W3 Security ArchitectureNeumann, Gustaf / Nusser, Stefan et al. | 1997
- 61
-
Security Issues in a Mobile Computing ParadigmMavridis, I. / Pangalos, G. et al. | 1997
- 77
-
MMIP — Mixed Mobile Internet ProtocolLopatic, T. / Eckert, C. / Baumgarten, U. et al. | 1997
- 91
-
A Cryptosystem Based on Error Control Codes and Stream CiphersDawson, E. / Polemi, D. et al. | 1997
- 102
-
Self-certified keys — Concepts and ApplicationsPetersenl, Holger / Horster, Patrick et al. | 1997
- 119
-
Formal methods for the Analysis and Design of Cryptographic Protocols: A state-of-the-art reviewGritzalis, S. / Nikitakos, N. / Georgiadis, P. et al. | 1997
- 133
-
A taxonomy of five elements to evaluate a secure networkPortillo, E. / Carracedo, J. et al. | 1997
- 143
-
Link Encryption in ATM SystemsRieke, Andreas et al. | 1997
- 155
-
B-ISDN user plane confidentiality by ATM cell stream intercepting encryptionLeitold, Herbert / Posch, Reinhard et al. | 1997
- 169
-
Role Based Access Control in Distributed SystemsVandenwauver, M. / Govaerts, R. / Vandewalle, J. et al. | 1997
- 178
-
The security API of IRO-DBEßmayr, W. / Pernul, G. / Tjoa, A. M. et al. | 1997
- 193
-
The Digital Signature InitiativeLipp, Peter / Sterbenz, Andreas et al. | 1997
- 203
-
A New Security Service Non-Repudiation of Mutual AgreementPiltz, S. et al. | 1997
- 215
-
A Technical Approach to the Transparent Encryption of MPEG-2 VideoDittmann, J. / Steinmetz, A. et al. | 1997
- 227
-
A comprehensive authentication and supervision architecture for networked multimedia systemsFurnell, S. M. / Illingworth, H. M. / Katsikas, S. K. / Reynolds, P. L. / Sanders, P. W. et al. | 1997
- 239
-
Using datagram based multimedia streams as a cover channel for hidden transmissionPatel, Ahmed / Schmidt, Nikita / Bessonov, Mikhail et al. | 1997
- 253
-
How to Support Secure Electronic Contract SigningZhang, N. / Shi, Q. et al. | 1997
- 265
-
Issues for the Commercial Distribution of Electronic DocumentsPrevelakis, Vassilis / Konstantas, Dimitri / Morin, Jean-Henry et al. | 1997
- 279
-
Status of the Computer Network Security Activities of the People’s Republic of ChinaKozik, E. et al. | 1997
- 295
-
An approach to security for world-wide applicationsBryce, Ciarán / Kühnhauser, Winfried et al. | 1997
- 307
-
Secure group communication: a dynamic approachAlexandris, Nikos / Burmester, Mike / Chrissikopoulos, Vassilis et al. | 1997