default search action
2nd Communications and Multimedia Security 1996: Essen, Germany
- Patrick Horster:
Communications and Multimedia Security II, Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security at Essen, Germany, 23-24 September 1996. IFIP Conference Proceedings 70, Chapman & Hall 1996, ISBN 0-412-79780-1 - A. Kranning:
PLASMA: Platform for Secure Multimedia Applications. Communications and Multimedia Security 1996: 1-12 - Eduardo B. Fernández, Krishnakumar R. Nair, María M. Larrondo-Petrie, Yan Xu:
High-Level Security Issues in Multimedia/Hypertext Systems. Communications and Multimedia Security 1996: 13-24 - Steven Furnell, Nichola Jane Salmons, Peter W. Sanders, Colin T. Stockel, Matthew J. Warren:
Approaches to Security in Healthcare Multimedia Systems. Communications and Multimedia Security 1996: 25-36 - Maryline Laurent:
Security Flows Analysis of the ATM Emulated LAN Architecture. Communications and Multimedia Security 1996: 37-52 - Markus Michels, Patrick Horster:
Cryptanalysis of a Voting Scheme. Communications and Multimedia Security 1996: 53-59 - Martin S. Olivier:
Using Workflow to Enhance Security in Federated Databases. Communications and Multimedia Security 1996: 60-71 - Simon Hoff, Kai Jakobs, Dogan Kesdogan:
Anonymous Mobility Management for Third Generation Mobile Networks. Communications and Multimedia Security 1996: 72-83 - Peter Lipp, Vesna Hassler:
Security Concepts for the WWW. Communications and Multimedia Security 1996: 84-95 - Jordi Forné, José L. Melús:
An Integrated Solution for Secure Communications over B-ISDN. Communications and Multimedia Security 1996: 96-107 - George Vassilacopoulos, Vassilios Chrissikopoulos, Dimitrios Peppes:
Network Security in a Telemedicine System. Communications and Multimedia Security 1996: 108-115 - Howard Cheng, Xiaobo Li:
On the Application of Image Decomposition to Image Compression. Communications and Multimedia Security 1996: 116-127 - Yun Ding, Patrick Horster, Holger Petersen:
A New Approach for Delegation Using Hierarchical Delegation Tokens. Communications and Multimedia Security 1996: 128-143 - Stefan Lucks:
BEAST: A Fast Block Cipher for Arbitrary Blocksizes. Communications and Multimedia Security 1996: 144-153 - Tomas Gustavsson:
A WWW Based Certification Infrastructure for Secure Open Network Transactions. Communications and Multimedia Security 1996: 154-165 - Rolf Oppliger, Martin Bracher:
Distributed Registration and Key Distribution for Online Universities. Communications and Multimedia Security 1996: 166-175 - Jörg Schwenk:
Establishing a Key Hierarchy for Conditional Access without Encryption. Communications and Multimedia Security 1996: 176-182 - Rüdiger Grimm, Kambiz Zangeneh:
Cybermoney in the Internet: An Overview over new Payment Systems in the Internet. Communications and Multimedia Security 1996: 183-195 - Cristian Radu, René Govaerts, Joos Vandewalle:
A Restrictive Blind Signature Scheme with Applications to Electronic Cash. Communications and Multimedia Security 1996: 196-207 - Stefan Pütz:
Secure Billing - Incontestable Charging. Communications and Multimedia Security 1996: 208-221 - Reinhard Posch, Herbert Leitold, Franz Pucher:
ISDN LAN Access: Remote Access Security and User Profile Management. Communications and Multimedia Security 1996: 222-233 - Andrew Hutchison, Matthias Kaiserswerth, Peter Trommler:
Secure World Wide Web Access to Server Groups. Communications and Multimedia Security 1996: 234-243 - Christiane Schmidt:
Access Control System Using Dynamic Handwriting Features. Communications and Multimedia Security 1996: 244-255 - Spyros Kokolakis:
Is there a Need for New Information Security Models? Communications and Multimedia Security 1996: 256-267 - Sokratis K. Katsikas, Dimitris Gritzalis, Paul G. Spirakis:
Attack Modelling in Open Network Environments. Communications and Multimedia Security 1996: 268-277 - Michael Sobirey, Birk Richter, Hartmut König:
The Intrusion Detection System AID - Architecture, and Experiences in Automated Audit Analysis. Communications and Multimedia Security 1996: 278-290 - Sokratis K. Katsikas, N. Theodoropoulos:
Defending Networks: The Expert System Components of SECURENET. Communications and Multimedia Security 1996: 291-302 - Paul M. Boshoff, Martin S. Olivier:
Increasing Firewall Reliability by Recording Routes. Communications and Multimedia Security 1996: 303-314
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.