From Protecting a System to Protecting a Global Ecosystem (English)
Free access
- New search for: Yung, Moti
- New search for: Yung, Moti
In:
Communications and Multimedia Security
3
;
255
;
2011
- Article/Chapter (Book) / Electronic Resource
-
Title:From Protecting a System to Protecting a Global Ecosystem
-
Contributors:Yung, Moti ( author )
-
Published in:Communications and Multimedia Security , 3 ; 255Lecture Notes in Computer Science ; 7025, 3 ; 255
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2011-01-01
-
Size:1 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Analysis of Revocation Strategies for Anonymous Idemix CredentialsLapon, Jorn / Kohlweiss, Markulf / Decker, Bart / Naessens, Vincent et al. | 2011
- 18
-
A Secure Key Management Framework for Heterogeneous Wireless Sensor NetworksAlagheband, Mahdi R. / Aref, Mohammad Reza et al. | 2011
- 32
-
Twin Clouds: Secure Cloud Computing with Low LatencyBugiel, Sven / Nürnberger, Stefan / Sadeghi, Ahmad-Reza / Schneider, Thomas et al. | 2011
- 45
-
Implementation Aspects of Anonymous Credential Systems for Mobile Trusted PlatformsDietrich, Kurt / Winter, Johannes / Luzhnica, Granit / Podesser, Siegfried et al. | 2011
- 59
-
Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging FeatureMerkel, Ronny / Dittmann, Jana / Vielhauer, Claus et al. | 2011
- 72
-
Two-Factor Biometric Recognition with Integrated Tamper-Protection WatermarkingHuber, Reinhard / Stögner, Herbert / Uhl, Andreas et al. | 2011
- 85
-
Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic HandwritingKümmel, Karl / Scheidat, Tobias / Arndt, Christian / Vielhauer, Claus et al. | 2011
- 94
-
Dynamic Software Birthmark for Java Based on Heap Memory AnalysisChan, Patrick P. F. / Hui, Lucas C. K. / Yiu, S. M. et al. | 2011
- 108
-
A Secure Perceptual Hash Algorithm for Image Content AuthenticationWeng, Li / Preneel, Bart et al. | 2011
- 122
-
Low-Attention Forwarding for Mobile Network Covert ChannelsWendzel, Steffen / Keller, Jörg et al. | 2011
- 134
-
Cryptanalysis of a SIP Authentication SchemeLiu, Fuwen / Koenig, Hartmut et al. | 2011
- 147
-
Mapping between Classical Risk Management and Game Theoretical ApproachesRajbhandari, Lisa / Snekkenes, Einar Arthur et al. | 2011
- 155
-
Digital Signatures: How Close Is Europe to Truly Interoperable Solutions?Rantos, Konstantinos et al. | 2011
- 163
-
A Generic Architecture for Integrating Health Monitoring and Advanced Care ProvisioningDecroix, Koen / Milutinovic, Milica / Decker, Bart / Naessens, Vincent et al. | 2011
- 171
-
A Modular Test Platform for Evaluation of Security Protocols in NFC ApplicationsOttoy, Geoffrey / Martens, Jeroen / Saeys, Nick / Preneel, Bart / Strycker, Lieven / Goemaere, Jean-Pierre / Hamelinckx, Tom et al. | 2011
- 178
-
GPU-Assisted AES Encryption Using GCMSchönberger, Georg / Fuß, Jürgen et al. | 2011
- 186
-
Radon Transform-Based Secure Image HashingNguyen, Dung Q. / Weng, Li / Preneel, Bart et al. | 2011
- 194
-
On Detecting Abrupt Changes in Network Entropy Time SeriesWinter, Philipp / Lampesberger, Harald / Zeilinger, Markus / Hermann, Eckehard et al. | 2011
- 206
-
Motif-Based Attack Detection in Network Communication GraphsJuszczyszyn, Krzysztof / Kołaczek, Grzegorz et al. | 2011
- 214
-
Secure Negotiation for Manual Authentication ProtocolsMilutinovic, Milica / Peeters, Roel / Decker, Bart et al. | 2011
- 222
-
A Secure One-Way Authentication Protocol in IMS ContextMaachaoui, Mohamed / Abou El Kalam, Anas / Fraboul, Christian et al. | 2011
- 235
-
High Capacity FFT-Based Audio WatermarkingFallahpour, Mehdi / Megías, David et al. | 2011
- 238
-
Efficient Prevention of Credit Card Leakage from Enterprise NetworksHall, Matthew / Koornstra, Reinoud / Mowbray, Miranda et al. | 2011
- 241
-
Security Warnings for Children’s Smart Phones: A First Design ApproachFruth, Jana / Merkel, Ronny / Dittmann, Jana et al. | 2011
- 244
-
Ciphertext-Policy Attribute-Based Broadcast Encryption SchemeAsim, Muhammad / Ibraimi, Luan / Petković, Milan et al. | 2011
- 247
-
Anonymous Authentication from Public-Key Encryption RevisitedSlamanig, Daniel et al. | 2011
- 253
-
Mobile Identity ManagementHoepman, Jaap-Henk et al. | 2011
- 254
-
Who Needs Facebook Anyway - Privacy and Sociality in Social Network SitesLeenes, Ronald E. et al. | 2011
- 255
-
From Protecting a System to Protecting a Global EcosystemYung, Moti et al. | 2011
- E1
-
Erratum to: Communications and Multimedia SecurityDecker, Bart / Lapon, Jorn / Naessens, Vincent / Uhl, Andreas et al. | 2011