Secure information networks : communications and multimedia security : IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS'99), September 20-21, 1999, Leuven, Belgium
| 000 | 01640camuu2200361 a 4500 | |
| 001 | 000000696652 | |
| 005 | 20091119154416 | |
| 008 | 990621s1999 maua b 101 0 eng | |
| 010 | ▼a 99037131 | |
| 015 | ▼a GB99-67133 | |
| 020 | ▼a 0792386000 | |
| 040 | ▼a DLC ▼c DLC ▼d C#P ▼d UKM ▼d OHX ▼d 211009 | |
| 050 | 0 0 | ▼a TK5105.59 ▼b .I35 1999 |
| 072 | 7 | ▼a TK ▼2 lcco |
| 082 | 0 0 | ▼a 005.8 ▼2 21 |
| 090 | ▼a 005.8 ▼b I23 ▼c [3] | |
| 111 | 2 | ▼a IFIP TC 6/TC 11 Joint Working Conference on Communications and Multimedia Security ▼d (1999 : ▼c Louvain, Belgium) |
| 245 | 1 0 | ▼a Secure information networks : ▼b communications and multimedia security : IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS'99), September 20-21, 1999, Leuven, Belgium / ▼c edited by Bart Preneel. |
| 246 | 3 0 | ▼a Communications and multimedia security |
| 246 | 3 0 | ▼a CMS '99 |
| 246 | 3 | ▼a Communications and multimedia security '99 |
| 260 | ▼a Boston : ▼b Kluwer Academic Publishers , ▼c c1999. | |
| 300 | ▼a x, 322 p. : ▼b ill. ; ▼c 24 cm. | |
| 490 | 1 | ▼a International Federation for Information Processing ; ▼v 23 |
| 504 | ▼a Includes bibliographical references. | |
| 650 | 0 | ▼a Computer networks ▼x Security measures ▼v Congresses. |
| 650 | 0 | ▼a Multimedia systems ▼x Security measures ▼v Congresses. |
| 650 | 0 | ▼a Computer security ▼v Congresses. |
| 650 | 0 | ▼a Cryptography ▼v Congresses. |
| 650 | 0 | ▼a Computer network protocols ▼v Congresses. |
| 700 | 1 | ▼a Preneel, Bart , ▼d 1963- |
| 830 | 0 | ▼a International Federation for Information Processing (Series) ; ▼v 23. |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 I23 3 | 등록번호 121047130 (1회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium from September 20-21, 1999. The Conference, arrangedjointly by Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP), was organized by the Department of Electrical Engineering of the Katholieke Universiteit Leuven. The name "Communications and Multimedia Security" was used for the first time in 1995, when Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) IT Sicherheit conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The Conference aims to provide an international forum for presentations and discussions on protocols and techniques for providing secure information networks. The contributions in this volume review the state-of the-art in communications and multimedia security, and discuss practical of topics experiences and new developments. They cover a wide spectrum inc1uding network security, web security, protocols for entity authentication and key agreement, protocols for mobile environments, applied cryptology, watermarking, smart cards, and legal aspects of digital signatures.
This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium from September 20-21, 1999. The Conference, arrangedjointly by Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP), was organized by the Department of Electrical Engineering of the Katholieke Universiteit Leuven. The name "Communications and Multimedia Security" was used for the first time in 1995, when Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) IT Sicherheit conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The Conference aims to provide an international forum for presentations and discussions on protocols and techniques for providing secure information networks. The contributions in this volume review the state-of the-art in communications and multimedia security, and discuss practical of topics experiences and new developments. They cover a wide spectrum inc1uding network security, web security, protocols for entity authentication and key agreement, protocols for mobile environments, applied cryptology, watermarking, smart cards, and legal aspects of digital signatures.
정보제공 :
목차
CONTENTS Preface = ⅸ Conference Committees = xi Network Security : ATM and ISDN Security On ATM Networks / STELIOS KARANASTASIS ; AHMED PATEL = 3 ISDN Security services / HERBERT LEITOLD ; KARL CHRISTIAN POSCH ; REINHARD POSCH = 21 An Alternative Access Control Architecture for IP over ATM Networks / OLIVIER PAUL ; MARYLlNE LAURENT = 36 Applied CryptologyⅠ Verifiable Democracy / YVO DESMEDT ; BRIAN KING = 53 Efficient Oblivious Proofs of Correct Exponentiation / MARKUS JAKOBSSON ; CLAUS PETER SCHNORR = 71 Entity Authentication and Key Agreement Protocols Weaknesses in EHA Authentication and Key Distribution Protocol / MARTIN STANEK ; DANIEL OLEJ A' R = 87 Formal Design of Efficient Authentication and Key-Agreement protocols / GUNNAR JACOBSON = 96 Applications On Authentication, Digital Signatures and Signature Laws / PER KAIJSER = 117 Watermarking and Secure Distribution for Encrypted Video / T.AMORNRAKSA ; D. R. B. BURGESS ; P. SWEENEY = 131 Implementing a Secure Log File Download Manager for the Java Card / CONSTANTINOS MARKANTONAKIS ; SIMEON XENITELLIS = 143 Network Security : IP Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks / ROLF OPPLIGER = 163 Secure Distributed Virtual Conferencing / W. A. ADAMSON ; C. J. ANTONELLI ; K. W. COFFMAN ; P. MCDANIEL ; J. REES = 176 PIM-SM Security : Interdomain Issues and Solutions / THOMAS HARDJONO ; BRAD CAIN = 191 Protocols for Mobile Applications Attacks against the WAP WTLS protocol / MARKKU-JUHANI SAARINEN = 209 A New Authentication Protocol for Portable Communication Systems / SHENG-BO XU ; CEES JANSEN ; HENK VAN TILBORG = 216 Token Based Authentication for Handover Security / YI CHENG, ARNE NOREFORS = 231 Applied CryptologyⅡ How to Securely Broadcast a Secret / J O ·· RG SCHWENK = 247 Proofs of Work and Bread Pudding Protocols / MARKUS JAKOBSSON ; ARI JUELS = 258 Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption Scheme / TAKEYUKI UEHARA ; REIHANEH SAFAVI-NAINI = 273 Web Security Secure Data-Transfer for Web-Based Applications / WOLFGANG PLATZER = 291 Using SESANlE to Secure Web Based Applications on an Intranet / PAUL ASHLEY ; MARK VANDENWAUVER ; JORIS CLAESSENS = 303 Contributors = 319 Keywords = 321
