Login / Signup
Communications and Multimedia Security
1996
2002
2008
2014
1996
2014
Keyphrases
Publications
2014
Paulo Pinto
,
Bernardo Patrão
,
Henrique Santos
Free Typed Text Using Keystroke Dynamics for Continuous Authentication.
Communications and Multimedia Security
(2014)
Paulo Mateus
,
Nikola Paunkovic
,
João Rodrigues
,
André Souto
Enhancing Privacy with Quantum Networks.
Communications and Multimedia Security
(2014)
Suaad S. Alarifi
,
Stephen D. Wolthusen
Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems.
Communications and Multimedia Security
(2014)
Abdulrahman Al-Mutairi
,
Stephen D. Wolthusen
Malicious MPLS Policy Engine Reconnaissance.
Communications and Multimedia Security
(2014)
Rodolphe Marques
,
André Zúquete
Decentralized Bootstrap for Social Overlay Networks.
Communications and Multimedia Security
(2014)
Andrea Kolberger
,
Ingrid Schaumüller-Bichl
,
Martin Deutschmann
Risk Analysis of Physically Unclonable Functions.
Communications and Multimedia Security
(2014)
Bernd Zwattendorfer
,
Daniel Slamanig
,
Klaus Stranacher
,
Felix Hörandner
A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption.
Communications and Multimedia Security
(2014)
Faysal Boukayoua
,
Jorn Lapon
,
Bart De Decker
,
Vincent Naessens
Secure Storage on Android with Context-Aware Access Control.
Communications and Multimedia Security
(2014)
Dalia Khader
D-Shuffle for Prêt à Voter.
Communications and Multimedia Security
(2014)
Dmitry Chernyavskiy
,
Natalia G. Miloslavskaya
An Approach to Information Security Policy Modeling for Enterprise Networks.
Communications and Multimedia Security
(2014)
Alexander Chan
,
Tzipora Halevi
,
Nasir D. Memon
Touchpad Input for Continuous Biometric Authentication.
Communications and Multimedia Security
(2014)
André Pereira
,
Manuel Eduardo Correia
,
Pedro Brandão
USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations.
Communications and Multimedia Security
(2014)
Dalia Khader
Introduction to Attribute Based Searchable Encryption.
Communications and Multimedia Security
(2014)
Ping Chen
,
Lieven Desmet
,
Christophe Huygens
A Study on Advanced Persistent Threats.
Communications and Multimedia Security
(2014)
Rui Melo Biscaia
The Fundamental Principle of Breach Prevention.
Communications and Multimedia Security
(2014)
volume 8735, 2014
Communications and Multimedia Security - 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings
Communications and Multimedia Security
8735 (2014)
2013
Benedikt Driessen
,
Markus Dürmuth
Achieving Anonymity against Major Face Recognition Algorithms.
Communications and Multimedia Security
(2013)
Xiaofeng Xia
An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models.
Communications and Multimedia Security
(2013)
Mario Hildebrandt
,
Jennifer Sturm
,
Jana Dittmann
,
Claus Vielhauer
Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications.
Communications and Multimedia Security
(2013)
Y. Sreenivasa Rao
,
Ratna Dutta
Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption.
Communications and Multimedia Security
(2013)
Hieu Cuong Nguyen
,
Stefan Katzenbeisser
Detecting Resized Double JPEG Compressed Images - Using Support Vector Machine.
Communications and Multimedia Security
(2013)
Matthias Trojahn
,
Florian Arndt
,
Frank Ortmeier
Authentication with Time Features for Keystroke Dynamics on Touchscreens.
Communications and Multimedia Security
(2013)
Edward Caprin
,
Yan Zhang
SocACL: An ASP-Based Access Control Language for Online Social Networks.
Communications and Multimedia Security
(2013)
Boris Assanovich
,
William Puech
,
Iuliia Tkachenko
Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors.
Communications and Multimedia Security
(2013)
Sachar Paulus
,
Nazila Gol Mohammadi
,
Thorsten Weyer
Trustworthy Software Development.
Communications and Multimedia Security
(2013)
Konstantinos Raftopoulos
,
Klimis S. Ntalianis
,
Paraskevi K. Tzouveli
,
Nicolas Tsapatsoulis
,
Aleatha Parker-Wood
,
Marin Ferecatu
Watermark Resynchronization: An Efficient Approach Based on Eulerian Tours around a Robust Skeleton.
Communications and Multimedia Security
(2013)
Marcel Eckert
,
Igor Podebrad
,
Bernd Klauer
Hardware Based Security Enhanced Direct Memory Access.
Communications and Multimedia Security
(2013)
Martin Steinebach
,
Peter Klöckner
,
Nils Reimers
,
Dominik Wienand
,
Patrick Wolf
Robust Hash Algorithms for Text.
Communications and Multimedia Security
(2013)
Gábor György Gulyás
,
Sándor Imre
Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation.
Communications and Multimedia Security
(2013)
Andreas Westfeld
,
Jürgen Wurzer
,
Christian Fabian
,
Ernst Piller
Pit Stop for an Audio Steganography Algorithm.
Communications and Multimedia Security
(2013)
Huajian Liu
,
Yiyao Li
,
Martin Steinebach
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion.
Communications and Multimedia Security
(2013)
Sabah A. Jassim
Face Recognition from Degraded Images - Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing Dictionaries.
Communications and Multimedia Security
(2013)
Jana Fruth
,
Carsten Schulze
,
Marleen Rohde
,
Jana Dittmann
E-Learning of IT Security Threats: A Game Prototype for Children.
Communications and Multimedia Security
(2013)
Andreas Hasselberg
,
René Zimmermann
,
Christian Kraetzer
,
Tobias Scheidat
,
Claus Vielhauer
,
Karl Kümmel
Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack.
Communications and Multimedia Security
(2013)
Geoffrey Ottoy
,
Jorn Lapon
,
Vincent Naessens
,
Bart Preneel
,
Lieven De Strycker
Dedicated Hardware for Attribute-Based Credential Verification.
Communications and Multimedia Security
(2013)
Mario Hildebrandt
,
Andrey Makrushin
,
Kun Qian
,
Jana Dittmann
Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans.
Communications and Multimedia Security
(2013)
Jan Vossaert
,
Jorn Lapon
,
Bart De Decker
,
Vincent Naessens
Client-Side Biometric Verification Based on Trusted Computing.
Communications and Multimedia Security
(2013)
Jutta Hämmerle-Uhl
,
Michael Pober
,
Andreas Uhl
Towards a Standardised Testsuite to Assess Fingerprint Matching Robustness: The StirMark Toolkit - Cross-Feature Type Comparisons.
Communications and Multimedia Security
(2013)
Takayuki Yamada
,
Seiichi Gohshi
,
Isao Echizen
Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity.
Communications and Multimedia Security
(2013)
volume 8099, 2013
Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings
Communications and Multimedia Security
8099 (2013)
2012
Tobias Scheidat
,
Karl Kümmel
,
Claus Vielhauer
Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance.
Communications and Multimedia Security
(2012)
Steffen Wendzel
,
Jörg Keller
Systematic Engineering of Control Protocols for Covert Channels.
Communications and Multimedia Security
(2012)
Hanno Langweg
OOXML File Analysis of the July 22nd Terrorist Manual.
Communications and Multimedia Security
(2012)
William Perrizo
,
Arjun G. Roy
Predicate-Tree Based Pretty Good Privacy of Data.
Communications and Multimedia Security
(2012)
Patrik Bichsel
,
Jan Camenisch
,
Bart De Decker
,
Jorn Lapon
,
Vincent Naessens
,
Dieter Sommer
Data-Minimizing Authentication Goes Mobile.
Communications and Multimedia Security
(2012)
Amar Siad
A New Approach for Private Searches on Public-Key Encrypted Data.
Communications and Multimedia Security
(2012)
Andrey Makrushin
,
Tobias Kiertscher
,
Robert Fischer
,
Stefan Gruhn
,
Claus Vielhauer
,
Jana Dittmann
Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans.
Communications and Multimedia Security
(2012)
Jan Hajny
,
Lukas Malina
Practical Revocable Anonymous Credentials.
Communications and Multimedia Security
(2012)
Milica Milutinovic
,
Vincent Naessens
,
Bart De Decker
Privacy-Preserving Scheduling Mechanism for eHealth Systems.
Communications and Multimedia Security
(2012)
volume 7394, 2012
Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings
Communications and Multimedia Security
7394 (2012)