default search action
13th Communications and Multimedia Security 2012: Canterbury, UK
- Bart De Decker, David W. Chadwick:
Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings. Lecture Notes in Computer Science 7394, Springer 2012, ISBN 978-3-642-32804-6
Research Papers
- Hieu Cuong Nguyen, Stefan Katzenbeisser:
Robust Resampling Detection in Digital Images. 3-15 - Karl Kümmel, Tobias Scheidat, Claus Vielhauer, Jana Dittmann:
Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries. 16-25 - Saloomeh Shariati, François Koeune, François-Xavier Standaert:
Security Analysis of Image-Based PUFs for Anti-counterfeiting. 26-38 - Mouhamadou L. Diong, Patrick Bas, Chloé Pelle, Wadih Sawaya:
Document Authentication Using 2D Codes: Maximizing the Decoding Performance Using Statistical Inference. 39-54 - Patrik Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer:
Data-Minimizing Authentication Goes Mobile. 55-71 - Zhuo Wei, Xuhua Ding, Robert Huijie Deng, Yongdong Wu:
No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption. 72-86
Work in Progress
- Andrey Makrushin, Tobias Kiertscher, Robert Fischer, Stefan Gruhn, Claus Vielhauer, Jana Dittmann:
Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans. 89-98 - Graeme Horsman, Christopher Laing, Paul Vickers:
A Method for Reducing the Risk of Errors in Digital Forensic Investigations. 99-106 - Tobias Scheidat, Karl Kümmel, Claus Vielhauer:
Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance. 107-116 - Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang:
A New Approach to Commutative Watermarking-Encryption. 117-130 - Steffen Wendzel, Jörg Keller:
Systematic Engineering of Control Protocols for Covert Channels. 131-144 - Elke Franz, Stefan Pfennig, André Fischer:
Efficiency of Secure Network Coding Schemes. 145-159 - Amar Siad:
A New Approach for Private Searches on Public-Key Encrypted Data. 160-173 - Mohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul, Abdellah Ait Ouahman:
Multi-level Authentication Based Single Sign-On for IMS Services. 174-187
Extended Abstracts
- Patrick Bas, Teddy Furon:
Are 128 Bits Long Keys Possible in Watermarking? 191 - William Perrizo, Arjun G. Roy:
Predicate-Tree Based Pretty Good Privacy of Data. 192-194 - Hanno Langweg:
OOXML File Analysis of the July 22nd Terrorist Manual. 195-197 - Milica Milutinovic, Vincent Naessens, Bart De Decker:
Privacy-Preserving Scheduling Mechanism for eHealth Systems. 198-200 - Jürgen Fuß, Wolfgang Kastl, Robert Kolmhofer, Georg Schönberger, Florian Wex:
Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors. 201-203 - André Zúquete, Pedro Correia, Miguel Rocha:
A Framework for Enforcing User-Based Authorization Policies on Packet Filter Firewalls. 204-206 - Robert Fischer, Tobias Kiertscher, Stefan Gruhn, Tobias Scheidat, Claus Vielhauer:
From Biometrics to Forensics: A Feature Collection and First Feature Fusion Approaches for Latent Fingerprint Detection Using a Chromatic White Light (CWL) Sensor. 207-210 - Jan Hajny, Lukas Malina:
Practical Revocable Anonymous Credentials. 211-213
Keynotes
- Siani Pearson:
Privacy Management in Global Organisations. 217-237 - Jon Crowcroft, Ian Brown:
From Panopticon to Fresnel, Dispelling a False Sense of Security. 238-242
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.