IFIP TC6 Open Digital Library

10. Communications and Multimedia Security 2006: Heraklion, Crete, Greece

Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings

Herbert Leitold, Evangelos P. Markatos

Springer, Lecture Notes in Computer Science 4237, ISBN: 3-540-47820-5



Contents

Advances in Network and Information Security

Computing of Trust in Ad-Hoc Networks.

Huafei Zhu, Feng Bao, Jianwei Liu

 1-11

TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation.

Spyros Antonatos, Kostas G. Anagnostakis

 12-21

On the Privacy Risks of Publishing Anonymized IP Network Traces.

Dimitris Koukis, Spyros Antonatos, Kostas G. Anagnostakis

 22-32

Secure Mobile Notifications of Civilians in Case of a Disaster.

Heiko Rossnagel, Tobias Scherner

 33-42

A Fair Anonymous Submission and Review System.

Vincent Naessens, Liesje Demuynck, Bart De Decker

 43-53

Attribute Delegation Based on Ontologies and Context Information.

Isaac Agudo, Javier Lopez, José A. Montenegro

 54-66

Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains.

David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen

 67-86

One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange.

Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee

 87-96

Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart.

Elias Athanasopoulos, Spyros Antonatos

 97-108

Perturbing and Protecting a Traceable Block Cipher.

Julien Bringer, Hervé Chabanne, Emmanuelle Dottax

 109-119

A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors.

Jörg Platte, Raúl Durán Díaz, Edwin Naroska

 120-129

Timed Release Cryptography from Bilinear Pairings Using Hash Chains.

Konstantinos Chalkias, George Stephanides

 130-140

Compression of Encrypted Visual Data.

Michael Gschwandtner, Andreas Uhl, Peter Wild

 141-150

Selective Encryption for Hierarchical MPEG.

Heinz Hofbauer, Thomas Stütz, Andreas Uhl

 151-160

Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods.

Xiangyang Luo, Chunfang Yang, Fenlin Liu

 161-172

A Flexible and Open DRM Framework.

Kristof Verslype, Bart De Decker

 173-184

PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies.

Giannakis Antoniou, Campbell Wilson, Dimitris Geneiatakis

 185-195

A Privacy Agent in Context-Aware Ubiquitous Computing Environments.

Ni (Jenny) Zhang, Chris Todd

 196-205

Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems.

Seng-Phil Hong, Sungmin Kang

 206-215

Attack Graph Based Evaluation of Network Security.

Igor V. Kotenko, Mikhail Stepashkin

 216-227

Information Modeling for Automated Risk Analysis.

Howard Chivers

 228-239

Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.

Andriy Panchenko, Lexi Pimenidis

 240-251