IFIP TC6 Open Digital Library

12. Communications and Multimedia Security 2011: Ghent, Belgium

Communications and Multimedia Security, 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings

Bart De Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl

Springer, Lecture Notes in Computer Science 7025, ISBN: 978-3-642-24711-8



Contents

Research Papers

Analysis of Revocation Strategies for Anonymous Idemix Credentials.

Jorn Lapon, Markulf Kohlweiss, Bart De Decker, Vincent Naessens

 3-17

A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks.

Mahdi R. Alaghband, Mohammad Reza Aref

 18-31

Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version).

Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider 0003

 32-44

Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms.

Kurt Dietrich, Johannes Winter, Granit Luzhnica, Siegfried Podesser

 45-58

Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature.

Ronny Merkel, Jana Dittmann, Claus Vielhauer

 59-71

Two-Factor Biometric Recognition with Integrated Tamper-Protection Watermarking.

Reinhard Huber, Herbert Stögner, Andreas Uhl

 72-84

Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting.

Karl Kümmel, Tobias Scheidat, Christian Arndt, Claus Vielhauer

 85-93

Dynamic Software Birthmark for Java Based on Heap Memory Analysis.

Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu

 94-107

A Secure Perceptual Hash Algorithm for Image Content Authentication.

Li Weng, Bart Preneel

 108-121

Low-Attention Forwarding for Mobile Network Covert Channels.

Steffen Wendzel, Jörg Keller

 122-133

Cryptanalysis of a SIP Authentication Scheme.

Fuwen Liu, Hartmut König

 134-143

Work in Progress

Mapping between Classical Risk Management and Game Theoretical Approaches.

Lisa Rajbhandari, Einar Snekkenes

 147-154

Digital Signatures: How Close Is Europe to Truly Interoperable Solutions?

Konstantinos Rantos

 155-162

A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning.

Koen Decroix, Milica Milutinovic, Bart De Decker, Vincent Naessens

 163-170

A Modular Test Platform for Evaluation of Security Protocols in NFC Applications.

Geoffrey Ottoy, Jeroen Martens, Nick Saeys, Bart Preneel, Lieven De Strycker, Jean-Pierre Goemaere, Tom Hamelinckx

 171-177

GPU-Assisted AES Encryption Using GCM.

Georg Schönberger, Jürgen Fuß

 178-185

Radon Transform-Based Secure Image Hashing.

Dung Q. Nguyen, Li Weng, Bart Preneel

 186-193

On Detecting Abrupt Changes in Network Entropy Time Series.

Philipp Winter, Harald Lampesberger, Markus Zeilinger, Eckehard Hermann

 194-205

Motif-Based Attack Detection in Network Communication Graphs.

Krzysztof Juszczyszyn, Grzegorz Kolaczek

 206-213

Secure Negotiation for Manual Authentication Protocols.

Milica Milutinovic, Roel Peeters, Bart De Decker

 214-221

A Secure One-Way Authentication Protocol in IMS Context.

Mohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul

 222-231

High Capacity FFT-Based Audio Watermarking.

Mehdi Fallahpour, David Megías

 235-237

Efficient Prevention of Credit Card Leakage from Enterprise Networks.

Matthew Hall, Reinoud Koornstra, Miranda Mowbray

 238-240

Security Warnings for Children's Smart Phones: A First Design Approach.

Jana Fruth, Ronny Merkel, Jana Dittmann

 241-243

Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme.

Muhammad Asim, Luan Ibraimi, Milan Petkovic

 244-246

Anonymous Authentication from Public-Key Encryption Revisited - (Extended Abstract).

Daniel Slamanig

 247-249

Keynotes

Mobile Identity Management.

Jaap-Henk Hoepman

 253

Who Needs Facebook Anyway - Privacy and Sociality in Social Network Sites.

Ronald E. Leenes

 254

From Protecting a System to Protecting a Global Ecosystem.

Moti Yung

 255