Table of contents for Communications and multimedia security : 9th IFIP TC-6 TC-11 international conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, proceedings / Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl (eds.).


Bibliographic record and links to related information available from the Library of Congress catalog
Note: Electronic data is machine generated. May be incomplete or contain other coding.


Counter
Applied Cryptography
Fast Contract Signing with Batch Oblivious Transfer
L 'ubica Stanekovd, Martin Stanek ................................  1
An Instruction Set Extension for Fast and Memory-Efficient AES
Implementation
Stefan Tillich, Johann Groflschddl, Alexander Szekely ..............  11
Self-Healing Key Distribution Schemes with Sponsorization
Germdn  Sdez .................................. .. .............  22
DRM & E-Commerce
Effective Protection Against Phishing and Web Spoofing
Rolf  Oppliger, Sebastian  Gajek  ..................................  32
Identity Based DRM: Personal Entertainment Domain
Paul Koster, Frank Kamperman, Peter Lenoir, Koen Vrielink .......  42
Rights and Trust in Multimedia Information Management
Jaime Delgado, Victor Torres, Silvia Llorente, Eva Rodriguez .......  55
Signature Amortization Using Multiple Connected Chains
Qusai Abuein, Susumu Shibusawa...............................    65
Media Encryption
A Key Embedded Video Codec for Secure Video Multicast
Hao Yin, Chuang Lin, Feng Qiu, Xiaowen Chu, Geyong Min ........  77
Puzzle - A Novel Video Encryption Algorithm
Fuwen Liu, Hartmut Koenig ....................................   88
Selective Image Encryption Using JBIG
Roman Pfarrhofer, Andreas Uhl ................................   98
Multimedia Security
On Reversibility of Random Binning Techniques: Multimedia
Perspectives
Sviatoslav Voloshynovskiy, Oleksiy Koval, Emre Topak,
Jose Emilio Vila-Forcen, Pedro Comesania Alfaro, Thierry Pun ...... 108
A Graph-Theoretic Approach to Steganography
Stefan  Hetzl, Petra Mutzel ...........  ........................  119
Non-Interactive Watermark Detection for a Correlation-Based
Watermarking Scheme
Andrd Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi .............. 129
Privacy
Video Surveillance: A Distributed Approach to Protect Privacy
Martin Schaffer, Peter Schartner ............................... 140
Privacy-Preserving Electronic Health Records
Liesje Demuynck, Bart De Decker .............................. 150
Using XACML for Privacy Control in SAML-Based Identity Federations
Wolfgang Hommel .......................................... 160
Biometrics & Access Control
Verifier-Tuple as a Classifier for Biometric Handwriting Authentication
- Combination of Syntax and Semantics
Andrea Oermann, Jana Dittmann, Claus Vielhauer ................ 170
Decentralised Access Control in 802.11 Networks
Marco Domenico Aime, Antonio Lioy, Gianluca Ramunno .......... 180
Multimodal Biometrics for Voice and Handwriting
Claus Vielhauer, Tobias Scheidat ............................... 191
Network Security
Compact Stimulation Mechanism for Routing Discovery Protocols in
Civilian Ad-Hoc Networks
Huafei Zhu, Feng Bao, Tieyan Li ............................. 200
Polymorphic Code Detection with GA Optimized Markov Models
Udo Payer, Stefan Kraxberger ................................ 210
A Secure Context Management for QoS-Aware Vertical Handovers in
4G Networks
Minsoo Lee, Sehyun Park ..................................... 220
Mobile Security
Security Analysis of the Secure Authentication Protocol by Means of
Coloured Petri Nets
Wiebke Dresp ............................................... 230
Assessment of Palm OS Susceptibility to Malicious Code Threats
Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen ...... 240
Implementation of Credit-Control Authorization with Embedded
Mobile IPv6 Authentication
HyunGon Kim, ByeongKyun Oh ................................. 250
Work in Progress Track
Biometrics: Different Approaches for Using Gaussian Mixture Models
in Handwriting
Sascha Schimke, Athanasios Valsamakis, Claus Vielhauer, Yannis
Stylianou  ....................................................  261
INVUS: INtelligent VUlnerability Scanner
Turker Akyuz, Ibrahim  Sogukpinar  ...............................  264
Personal Rights Management - Enabling Privacy Rights in Digital
Online Content
Mina Deng, Lothar Fritsch, Klaus Kursawe ....................... 266
Flexible Traitor Tracing for Anonymous Attacks
Hongxia Jin, Jeffery Lotspiech .................................. 269
Efficient Key Distribution for Closed Meetings in the Internet
Fuwen Liu, Hartmut Koenig .................................... 271
Blind Statistical Steganalysis of Additive Steganography Using Wavelet
Higher Order Statistics
Taras Holotyak, Jessica Fridrich, Sviatoslav Voloshynovskiy ......... 273
Applying LR Cube Analysis to JSteg Detection
Kwangsoo Lee, Changho Jung, Sangjin Lee, HyungJun Kim,
Jongin Lim ................................................... 271
Digital Signatures Based on Invertible Watermarks for Video
Authentication
Enrico Hauer, Jana Dittmann, Martin Steinebach .................. 271
A Theoretical Framework for Data-Hiding in Digital and Printed Text
Documents
Renato Villdn, Sviatoslav Voloshynovskiy, Frederic Deguillaume,
Yuriy Rytsar, Oleksiy Koval, Emre Topak, Ernesto Rivera,
Thierry  Pun  .................................................  288
Semantically Extended Digital Watermarking Model for Multimedia
Content
Huajian Liu, Lucilla Croce Ferri, Martin Steinebach ................ 28
An Architecture for Secure Policy Enforcement in E-Government
Services Deployment
Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland ........... 284
Some Critical Aspects of the PKIX TSP
Cristian Marinescu, Nicolae Tapus .............  ............... 28
Motivations for a Theoretical Approach to WYSIWYS
Antonio Lioy, Gianluca Ramunno, Marco Domenico Aime,
M assimiliano  Pala  ............................................  289
Special Session: XML Security
Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail
Applications
Lars Ewers, Wolfgang Kubbilun, Lijun Liao, J5rg Schwenk .......... 291
Integrating XML Linked Time-Stamps in OASIS Digital Signature
Services
Ana Isabel Gonzdlez-Tablas, Karel Wouters ....................... 301
Trustworthy Verification and Visualisation of Multiple XML-Signatures
Wolfgang Kubbilun, Sebastian Gajek, Michael Psarros,
Jdrg Schwenk ................................................ 311
Experience XML Security - The XML-Security Plug-In for Eclipse
Dominik Schadow ......... ......... ........................... 321
How to Make a Federation Manageable
Christian Geuer-Pollmann ........... . .    .   . . . ................. . .. 330
XML Signatures in an Enterprise Service Bus Environment
Eckehard Hermann, Dieter Kessler .................................  339
Using the XML Key Management Specification (and Breaking X.509
Rules as You Go)
Stephen  Farrell, Jose Kahan  . . .. . . ...... ...  .   ........ .  ... .. .  ..   348



Library of Congress subject headings for this publication: Computer networks Security measures Congresses, Telecommunication systems Security measures Congresses, Computer security Congresses