The Influence of Context on Privacy, Trust and Security -- Some Research Challenges in Pervasive Computing -- Overview -- Survey on Location Privacy in Pervasive Computing -- Exploring the Relationship Between Context and Privacy -- Privacy, Security and Trust Issues Raised by the Personal Server Concept -- Secure Trust Models and Management in Pervasive Computing -- Overview -- The Role of Ide…
Anonymity and Covert Channels in Simple Timed Mix-Firewalls -- Practical Traffic Analysis: Extending and Resisting Statistical Disclosure -- The Traffic Analysis of Continuous-Time Mixes -- Reputable Mix Networks -- Secure Outsourcing of Sequence Comparisons -- An Improved Construction for Universal Re-encryption -- Electromagnetic Eavesdropping Risks of Flat-Panel Displays -- On the Anonymity …
This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, provid…
The Second International Symposium on Ubiquitous Intelligence and Smart Worlds (UISW 2005) -- IFIP International Symposium on Network-Centric Ubiquitous Systems (NCUS 2005) -- The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005) -- The 1st International Workshop on RFID and Ubiquitous Sensor Networks (USN 2005) -- The International Workshop on Trusted and …
Two-Server Password-Only Authenticated Key Exchange -- Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks -- Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme -- Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution -- A Traitor Tracing Scheme Based on RSA for Fast Decryption -- N-Par…
Session I: Steganography and Steganalysis -- A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography -- Information Transmission and Steganography -- On the Existence of Perfect Stegosystems -- Towards Multi-class Blind Steganalyzer for JPEG Images -- Session II: Fingerprinting -- An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption -- C…
Invited Lecture -- Reversible Data Hiding -- Fingerprinting Curves -- Informed Detection Revisited -- Session I: Systems -- A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images -- A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition -- Better Use of Human Visual Model in Watermarking Based on Li…
Streams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages -- Revocation of Obligation and Authorisation Policy Objects -- Role Slices: A Notation for RBAC Permission Assignment and Enforcement -- Designing Secure Indexes for Encrypted Databases -- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases -- Verified Query Resul…
General Security Issues -- IT Security Development -- A Case for Public and Private Review of Developing it Security Standards -- Assuring Critical Information Infrastructure -- Systemic Challenges for Critical Information Infrastructure Protection -- Decentralized Energy Supply to Secure Computer Systems -- Dependability -- Safety Analysis Methods—Software Development Questions -- Trust Case…
Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature Schemes from Asiacrypt 2003 -- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security Analysis of Password-Authenticated Key Agreement Protocols -- Intrusion Detection and Viruses -…