|
Showing 1 - 7 of
7 matches in All Departments
This book constitutes the refereed proceedings of the 15th IFIP TC
6/TC 11 International Conference on Communications and Multimedia
Security, CMS 2014, held in Aveiro, Portugal, in September 2014.
The 4 revised full papers presented together with 6 short papers, 3
extended abstracts describing the posters that were discussed at
the conference, and 2 keynote talks were carefully reviewed and
selected from 22 submissions. The papers are organized in topical
sections on vulnerabilities and threats, identification and
authentification, applied security.
|
Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings (Paperback, 2013 ed.)
Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer
|
R1,557
Discovery Miles 15 570
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 14th IFIP TC
6/TC 11 International Conference on Communications and Multimedia
Security, CMS 2013, held in Magdeburg, Germany, in September 2013.
The 5 revised full papers presented together with 11 short papers,
5 extended abstracts describing the posters that were discussed at
the conference, and 2 keynote talks were carefully reviewed and
selected from 30 submissions. The papers are organized in topical
sections on biometrics; applied cryptography; digital watermarking,
steganography and forensics; and social network privacy, security
and authentication.
The first Annual Working Conference ofWG11.4oftheInter
nationalFederationforInformation Processing (IFIP),focuseson
variousstate of the art concepts in the field of Network and Dis
tributedSystemsSecurity. Oursocietyisrapidly evolvingand
irreversibly set onacourse governedby electronicinteractions.
Wehave seen thebirthofe mail in the early seventies, and are now
facing new challenging applicationssuchase commerce, e
government,...Themoreour societyrelies on electronicforms
ofcommunication,themorethe securityofthesecommunicationnetworks
isessentialforitswell functioning.
Asaconsequence,researchonmethodsandtechniques toimprove network
security iso fparam ount importance. ThisWorking Conference
bringstogetherresearchersandprac
tionersofvariousdisciplines,organisationsandcountries,todiscuss
thelatestdevelopmentsinsecurity protocols, secure software engin
eering,mobileagentsecurity,e commercesecurityandsecurityfor
distributedcomputing.
Wearealsopleasedtohaveattractedtwointernationalspeakers
topresenttwo case studies,one dealing withBelgium'sintentionto
replacetheidentity card ofitscitizensbyanelectronicversion,and
theotherdiscussingtheimplicationsofthesecuritycertificationin
amultinationalcorporation. ThisWorking Conference s
houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof
which can be summarizedas follows: topromoteresearch on technical
measures forsecuringcom puternetworks, including bothhardware
andsoftware based techniques. to promote dissemination of research
results in the field of network security in real lifenetworks in
industry, academia and administrative ins titutions. viii
topromoteeducationintheapplicationofsecuritytechniques,
andtopromotegeneral awarenessa boutsecurityproblems in
thebroadfieldofinformationtechnology. Researchers and practioners
who want to get involved in this Working Group, are
kindlyrequestedtocontactthechairman.
MoreinformationontheworkingsofWG11.4isavailable from the
officialIFIP website:http://www.ifip.at.org/. Finally,wewish
toexpressour gratitudetoallthosewho have
contributedtothisconference in one wayoranother. Wearegr ate
fultothe internationalrefereeboard whoreviewedallthe papers
andtotheauthorsandinvitedspeakers,whosecontributionswere essential
to the successof the conference. We would alsoliketo
thanktheparticipantswhosepresenceand interest, togetherwith
thechangingimperativesofsociety,willprovea drivingforce for
futureconferencestocome.
This book constitutes the refereed proceedings of the 13th IFIP TC
6/TC 11 International Conference on Communications and Multimedia
Security, CMS 2012, held in Canterbury, UK, in September 2012. The
6 revised full papers presented together with 8 short papers, 8
extended abstracts describing the posters that were discussed at
the conference, and 2 keynote talks were carefully reviewed and
selected from 43 submissions. The papers are organized in topical
sections on image and handwriting analysis, authentication and
performance, biometrics, forensics and watermarking, and
communications security.
|
Communications and Multimedia Security - 12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21, 2011, Proceedings (Paperback)
Bart De Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl
|
R1,550
Discovery Miles 15 500
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 12th IFIP TC
6/TC 11 International Conference on Communications and Multimedia
Security, CMS 2010, held in Ghent, Belgium, in October 2011. The 26
revised papers presented were carefully reviewed and selected from
52 submissions. The papers are organized in topical sections on
usability, architecture and framework security, mobile identity
management, secure hardware platforms, biometrics, multimedia
security, network security and authentication.
Over the last decade, we have witnessed a growing dependency on
information technologyresultingina wide rangeofnew opportunities.
Clearly, ithas become almost impossible to imagine life without a
personal computer or laptop, or without a cell phone. Social
network sites (SNS) are competing with face-- face encounters and
may even oust them. Most SNS-adepts have hundreds of "friends,"
happily sharing pictures and pro?les and endless chitchat. We are
on the threshold of the Internet of Things, where every object will
have its RFID-tag. This will not only e?ect companies, who will be
able to optimize their production and delivery processes, but also
end users, who will be able to enjoy many new applications, ranging
from smart shopping, and smart fridges to geo-localized services.
In the near future, elderly people will be able to stay longer at
home due to clever health monitoring systems. The sky seems to be
the limit However, we have also seen the other side of the coin:
viruses, Trojan horses, breaches of privacy, identity theft, and
other security threats. Our real and virtual worlds are becoming
increasingly vulnerable to attack. In order to encouragesecurity
researchby both academia and industry and to stimulate the
dissemination of results, conferences need to be organized. With
the 11th edition of the joint IFIP TC-6 TC-11 Conference on C-
munications and Multimedia Security (CMS 2010), the organizers
resumed the tradition of previous CMS conferences after a
three-year recess.
The first Annual Working Conference ofWG11.4oftheInter
nationalFederationforInformation Processing (IFIP), focuseson
variousstate of the art concepts in the field of Network and Dis
tributedSystemsSecurity. Oursocietyisrapidly evolvingand
irreversibly set onacourse governedby electronicinteractions.
Wehave seen thebirthofe mail in the early seventies, and are now
facing new challenging applicationssuchase commerce, e government,
....Themoreour societyrelies on electronicforms ofcommunication,
themorethe securityofthesecommunicationnetworks
isessentialforitswell functioning. Asaconsequence,
researchonmethodsandtechniques toimprove network security iso
fparam ount importance. ThisWorking Conference
bringstogetherresearchersandprac tionersofvariousdisciplines,
organisationsandcountries, todiscuss
thelatestdevelopmentsinsecurity protocols, secure software engin
eering, mobileagentsecurity, e commercesecurityandsecurityfor
distributedcomputing.
Wearealsopleasedtohaveattractedtwointernationalspeakers
topresenttwo case studies, one dealing withBelgium'sintentionto
replacetheidentity card ofitscitizensbyanelectronicversion, and
theotherdiscussingtheimplicationsofthesecuritycertificationin
amultinationalcorporation. ThisWorking Conference s
houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof
which can be summarizedas follows: topromoteresearch on technical
measures forsecuringcom puternetworks, including bothhardware
andsoftware based techniques. to promote dissemination of research
results in the field of network security in real lifenetworks in
industry, academia and administrative ins titutions. viii
topromoteeducationintheapplicationofsecuritytechniques,
andtopromotegeneral awarenessa boutsecurityproblems in
thebroadfieldofinformationtechnology. Researchers and practioners
who want to get involved in this Working Group, are
kindlyrequestedtocontactthechairman.
MoreinformationontheworkingsofWG11.4isavailable from the
officialIFIP website: http: //www.ifip.at.org/. Finally, wewish
toexpressour gratitudetoallthosewho have
contributedtothisconference in one wayoranother. Wearegr ate
fultothe internationalrefereeboard whoreviewedallthe papers
andtotheauthorsandinvitedspeakers, whosecontributionswere essential
to the successof the conference. We would alsoliketo
thanktheparticipantswhosepresenceand interest, togetherwith
thechangingimperativesofsociety, willprovea drivingforce for
futureconferen
|
|