Full Text Documents

Search


Table of Contents
Communications and Multimedia Security
Bart Decker, Ingrid Schaumüller-Bichl
Front Matter

WiFi and RF Security


A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks
Amitabh Saxena, Ben Soh
4-15
Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion
Saif Al-Kuwari, Stephen D. Wolthusen
16-27

XML and Web Services Security


Throwing a MonkeyWrench into Web Attackers Plans
Armin Büscher, Michael Meier, Ralf Benzmüller
28-39
Security in OpenSocial-Instrumented Social Networking Services
Matthias Häsel, Luigi Lo Iacono
40-52
Security for XML Data Binding
Nils Gruschka, Luigi Lo Iacono
53-63

Watermarking and Multimedia Security


Watermark Detection for Video Bookmarking Using Mobile Phone Camera
Peter Meerwald, Andreas Uhl
64-74
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems
Ulrich Rührmair, Stefan Katzenbeisser, Martin Steinebach, Sascha Zmudzinski
75-80
Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking
Thomas Stütz, Andreas Uhl
81-92

Analysis and Detection of Malicious Code and Risk Management


Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
Ronny Merkel, Tobias Hoppe, Christian Kraetzer, Jana Dittmann
93-105
A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)
Nicolas Racz, Edgar Weippl, Andreas Seufert
106-117
Business and IT Continuity Benchmarking
Wolfgang Neudorfer, Louis Marinos, Ingrid Schaumüller-Bichl
118-129

VoIP Security


Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks
Ge Zhang, Simone Fischer-Hübner
130-141
SIP Proxies: New Reflectors in the Internet
Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi, Simone Fischer-Hübner
142-153
Analysis of token and ticket based mechanisms for current voIP security issues and enhancement proposal
Patrick Battistello, Cyril Delétré
154 - 165

Biometrics


Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication
Stefan Rass, David Schuller, Christian Kollmitzer
166-177
Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction
Karl Kümmel, Claus Vielhauer, Tobias Scheidat, Dirk Franke, Jana Dittmann
178-190
Privacy Preserving Key Generation for Iris Biometrics
Christian Rathgeb, Andreas Uhl
191-200

Applied Cryptography


Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare
Daniel Slamanig, Stefan Rass
201-213
Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
Chul Sur, Chae Duk Jung, Youngho Park, Kyung Hyune Rhee
214-232
Detecting Hidden Encrypted Volumes
Christopher Hargreaves, Howard Chivers
233-244

Secure Communications


Tor HTTP Usage and Information Leakage
Markus Huber, Martin Mulazzani, Edgar Weippl
245-255
Secure Communication Using Identity Based Encryption
Sebastian Roschke, Luan Ibraimi, Feng Cheng, Christoph Meinel
256-267
Anonymous Client Authentication for Transport Layer Security
Kurt Dietrich
268-280