IFIP TC6 Open Digital Library

11. Communications and Multimedia Security 2010: Linz, Austria

Communications and Multimedia Security, 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings

Bart De Decker, Ingrid Schaumüller-Bichl

Springer, Lecture Notes in Computer Science 6109, ISBN: 978-3-642-13240-7



Contents

WiFi and RF Security

A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks.

Amitabh Saxena, Ben Soh

 4-15

Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion.

Saif Al-Kuwari, Stephen D. Wolthusen

 16-27

XML and Web Services Security

Throwing a MonkeyWrench into Web Attackers Plans.

Armin Büscher, Michael Meier 0001, Ralf Benzmüller

 28-39

Security in OpenSocial-Instrumented Social Networking Services.

Matthias Häsel, Luigi Lo Iacono

 40-52

Security for XML Data Binding.

Nils Gruschka, Luigi Lo Iacono

 53-63

Watermarking and Multimedia Security

Watermark Detection for Video Bookmarking Using Mobile Phone Camera.

Peter Meerwald, Andreas Uhl

 64-74

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems.

Ulrich Rührmair, Stefan Katzenbeisser, Martin Steinebach, Sascha Zmudzinski

 75-80

Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking.

Thomas Stütz, Andreas Uhl

 81-92

Analysis and Detection of Malicious Code and Risk Management

Statistical Detection of Malicious PE-Executables for Fast Offline Analysis.

Ronny Merkel, Tobias Hoppe, Christian Krätzer, Jana Dittmann

 93-105

A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC).

Nicolas Racz, Edgar Weippl, Andreas Seufert

 106-117

Business and IT Continuity Benchmarking.

Wolfgang Neudorfer, Louis Marinos, Ingrid Schaumüller-Bichl

 118-129

VoIP Security

Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks.

Ge Zhang, Simone Fischer-Hübner

 130-141

SIP Proxies: New Reflectors in the Internet.

Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi, Simone Fischer-Hübner

 142-153

Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal.

Patrick Battistello, Cyril Delétré

 154-165

Biometrics

Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication.

Stefan Rass, David Schuller, Christian Kollmitzer

 166-177

Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction.

Karl Kümmel, Claus Vielhauer, Tobias Scheidat, Dirk Franke, Jana Dittmann

 178-190

Privacy Preserving Key Generation for Iris Biometrics.

Christian Rathgeb, Andreas Uhl

 191-200

Applied Cryptography

Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare.

Daniel Slamanig, Stefan Rass

 201-213

Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption.

Chul Sur, Chae Duk Jung, Youngho Park, Kyung Hyune Rhee

 214-232

Detecting Hidden Encrypted Volumes.

Christopher Hargreaves, Howard Chivers

 233-244

Secure Communications

Tor HTTP Usage and Information Leakage.

Markus Huber, Martin Mulazzani, Edgar Weippl

 245-255

Secure Communication Using Identity Based Encryption.

Sebastian Roschke, Luan Ibraimi, Feng Cheng 0002, Christoph Meinel

 256-267

Anonymous Client Authentication for Transport Layer Security.

Kurt Dietrich

 268-280