The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community, with numerous individuals, as well as with prestigious organizations and Societies, LNCS has grown into the most comprehensive computer science research forum available.The scope of LNCS, including its sub series LNAI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material published traditionally includes- Proceedings(published in time for the respective conference) - Post-proceedings(consisting of thoroughly revised final full papers) -research monographs(which may be based on outstanding PhD work, research projects, technical reports, etc.)
作者簡(jiǎn)介
暫缺《通信與多媒體安全 CMS 2006/會(huì)議錄LNCS-4237》作者簡(jiǎn)介
圖書(shū)目錄
Advances in Network and Information Security Computing of Trust in Ad-Hoc Networks TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation On the Privacy Risks of Publishing Anonymized IP Network Traces Secure Mobile Notifications of Civilians in Case of a Disaster A Fair Anonymous Submission and Review System Attribute Delegation Based on Ontologies and Context Information Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart Perturbing and Protecting a Traceable Block Cipher A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors Timed Release Cryptography from Bilinear Pairings Using Hash Chains Compression of Encrypted Visual Data Selective Encryption for Hierarchical MPEG Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods A Flexible and Open DRM Framework PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies A Privacy Agent in Context-Aware Ubiquitous Computing Environments Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems Attack Graph Based Evaluation of Network Security Information Modeling for Automated Risk Analysis Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication Author Index