Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Für diesen Artikel ist leider kein Bild verfügbar.

Communications and Multimedia Security II

Patrick Horster (Herausgeber)

Buch | Softcover
318 Seiten
1997 | Softcover reprint of the original 1st ed. 1996
Springer-Verlag New York Inc.
978-1-5041-2931-2 (ISBN)
Preis auf Anfrage
  • Titel wird leider nicht erscheinen
  • Artikel merken
In multimedia and communication environments all documents must be protected against attacks. The required security can be achieved by a number of different security measures. This volume contains the selected proceedings of the joint conference on Communications and Multimedia Security;
In multimedia and communication environments all documents must be protected against attacks. The movie Forrest Gump showed how multimedia documents can be manipulated. The required security can be achieved by a number of different security measures. This book provides an overview of the current research in Multimedia and Communication Security. A broad variety of subjects are addressed including: network security; attacks; cryptographic techniques; healthcare and telemedicine; security infrastructures; payment systems; access control; models and policies; auditing and firewalls. This volume contains the selected proceedings of the joint conference on Communications and Multimedia Security; organized by the International Federation for Information processing and supported by the Austrian Computer Society, Gesellschaft fuer Informatik e.V. and TeleTrust Deutschland e.V. The conference took place in Essen, Germany, in September 1996

PLASMA platform for secure multimedia applications. High-level security issues in multimedia/hypertext systems. Approaches to security in healthcare multimedia systems. Security flows analysis of the ATM emulated LAN. Cryptoanalysis of a voting scheme. Using workflow to enhance security in federated. Anonymous mobility management for third generation mobile networks. Security concepts for the WWW. An integrated solution for secure communications over B-ISDN. Network security in a telemedicine system. On the application of image decomposition to image compression and encryption. A new approach for delegation using hierarchical delegation tokens. BEAST: a fast block cipher for arbitrary blocksizes. A WWW based certification infrastructure for secure open network transactions. Distributed registration and key distribution for online universities. Establishing a key hierarchy for conditional access without encryption. Cybermoney in the Internet: an overview over new payment systems in the Internet. A restrictive blind signature scheme with applications to electronic cash. Secure billing - incontestable charging. ISDN LAN access: remote access security and user profile management. Secure World Wide Web access to server groups. Access control system using dynamic handwriting features. Is there a need for new information security models? Attack modelling in open network. The intrusion detection system AID - architecture, and experiences in automated audit analysis. Defending Networks: the expert system components of SECURENET. Increasing firewall reliability by recording routes. Index of contributors. Keyword index.

Erscheinungsdatum
Reihe/Serie IFIP Advances in Information and Communication Technology
Zusatzinfo VII, 318 p.
Verlagsort New York
Sprache englisch
Maße 155 x 235 mm
Themenwelt Mathematik / Informatik Informatik Datenbanken
Mathematik / Informatik Informatik Netzwerke
Technik
ISBN-10 1-5041-2931-8 / 1504129318
ISBN-13 978-1-5041-2931-2 / 9781504129312
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Der Leitfaden für die Praxis

von Christiana Klingenberg; Kristin Weber

Buch (2025)
Hanser (Verlag)
CHF 69,95