
Communications and Multimedia Security
by Leitold, Herbert; Markatos, Evangelos-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Rent Textbook
Rent Digital
New Textbook
We're Sorry
Sold Out
Used Textbook
We're Sorry
Sold Out
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Table of Contents
Advances in Network and Information Security | |
Computing of Trust in Ad-Hoc Networks | p. 1 |
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation | p. 12 |
On the Privacy Risks of Publishing Anonymized IP Network Traces | p. 22 |
Secure Mobile Notifications of Civilians in Case of a Disaster | p. 33 |
A Fair Anonymous Submission and Review System | p. 43 |
Attribute Delegation Based on Ontologies and Context Information | p. 54 |
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains | p. 67 |
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange | p. 87 |
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart | p. 97 |
Perturbing and Protecting a Traceable Block Cipher | p. 109 |
A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors | p. 120 |
Timed Release Cryptography from Bilinear Pairings Using Hash Chains | p. 130 |
Compression of Encrypted Visual Data | p. 141 |
Selective Encryption for Hierarchical MPEG | p. 151 |
Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods | p. 161 |
A Flexible and Open DRM Framework | p. 173 |
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies | p. 185 |
A Privacy Agent in Context-Aware Ubiquitous Computing Environments | p. 196 |
Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems | p. 206 |
Attack Graph Based Evaluation of Network Security | p. 216 |
Information Modeling for Automated Risk Analysis | p. 228 |
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication | p. 240 |
Author Index | p. 253 |
Table of Contents provided by Ingram. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.