default search action
4th Communications and Multimedia Security 1999: Leuven, Belgium
- Bart Preneel:
Secure Information Networks: Communications and Multimedia Security, IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS '99), September 20-21, 1999, Leuven, Belgium. IFIP Conference Proceedings 152, Kluwer 1999, ISBN 0-7923-8600-0
Network Security: ATM and ISDN
- Stelios Karanastasis, Ahmed Patel:
Security On ATM Networks. Communications and Multimedia Security 1999: 3-20 - Herbert Leitold, Karl C. Posch, Reinhard Posch:
ISDN Security services. Communications and Multimedia Security 1999: 21-35 - Olivier Paul, Maryline Laurent:
An Alternative Access Control Architecture for IP over ATM Networks. Communications and Multimedia Security 1999: 36-52
Applied Cryptology I
- Yvo Desmedt, Brian King:
Verifiable Democracy. Communications and Multimedia Security 1999: 53-70 - Markus Jakobsson, Claus-Peter Schnorr:
Efficient Oblivious Proofs of Correct Exponentiation. Communications and Multimedia Security 1999: 71-86
Entity Authentication and Key Agreement Protocols
- Martin Stanek, Daniel Olejár:
Weaknesses in EHA Authentication and Key Distribution Protocol. Communications and Multimedia Security 1999: 87-95 - Gunnar Jacobson:
Formal Design of Efficient Authentication and Key-Agreement. Communications and Multimedia Security 1999: 96-116
Applications
- Per Kaijser:
On Authentication, Digital Signatures and Signature Laws. Communications and Multimedia Security 1999: 117-132 - Thumrongrat Amornraksa, David R. B. Burgess, Peter Sweeney:
Watermarking and Secure Distribution for Encrypted Video. Communications and Multimedia Security 1999: 131-142 - Constantinos Markantonakis, Simeon Xenitellis:
Implementing a Secure Log File Download Manager for the Java Card. Communications and Multimedia Security 1999: 143-162
Network Security: IP
- Rolf Oppliger:
Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks. Communications and Multimedia Security 1999: 163-175 - William A. Adamson, Charles J. Antonelli, Kevin Coffman, Patrick D. McDaniel, Jim Rees:
Secure Distributed Virtual Conferencing. Communications and Multimedia Security 1999: 176-190 - Thomas Hardjono, Brad Cain:
PIM -SM Security: Interdomain Issues and Solutions. Communications and Multimedia Security 1999: 191-208
Protocols for Mobile Applications
- Markku-Juhani Olavi Saarinen:
Attacks against the WAP WTLS protocol. Communications and Multimedia Security 1999: 209-215 - Sheng-Bo Xu, Cees Jansen, Henk C. A. van Tilborg:
A New Authentication Protocol for Portable Communication Systems. Communications and Multimedia Security 1999: 216-230 - Yi Cheng, Arne Norefors:
Token Based Authentication for Handover Security. Communications and Multimedia Security 1999: 231-246
Applied Cryptology II
- Jörg Schwenk:
How to Security Broadcast a Secret. Communications and Multimedia Security 1999: 247-257 - Markus Jakobsson, Ari Juels:
Proofs of Work and Bread Pudding Protocols. Communications and Multimedia Security 1999: 258-272 - Takeyuki Uehara, Reihaneh Safavi-Naini:
Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme. Communications and Multimedia Security 1999: 273-290
Web Security
- Wolfgang Platzer:
Secure Data- Transfer for Web- Based Applications. Communications and Multimedia Security 1999: 291-302 - Paul Ashley, Mark Vandenwauver, Joris Claessens:
Using SESAME to Secure Web Based Applications on an Intranet. Communications and Multimedia Security 1999: 303-318
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.