Skip to Main content Skip to Navigation
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Communications and Multimedia Security
David Chadwick, Bart Decker (Eds.)
Front Matter

Part I: Research Papers


Image and Handwriting Analysis

Robust Resampling Detection in Digital Images
Hieu Nguyen, Stefan Katzenbeisser
3-15
Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries
Karl Kümmel, Tobias Scheidat, Claus Vielhauer, Jana Dittmann
16-25
Security Analysis of Image-Based PUFs for Anti-counterfeiting
Saloomeh Shariati, François Koeune, François-Xavier Standaert
26-38

Authentication and Performance

Document authentication using 2D codes: Maximizing the decoding performance using statistical inference
Lamine Diong, Patrick Bas, Chloé Pelle, Wadih Sawaya
39-54
Data-Minimizing Authentication Goes Mobile
Patrik Bichsel, Jan Camenisch, Bart Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer
55-71
No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption
Zhuo Wei, Xuhua Ding, Robert Deng, Yongdong Wu
72-86

Part II: Work in Progress


Biometrics, Forensics and Watermarking

Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans
Andrey Makrushin, Tobias Kiertscher, Robert Fischer, Stefan Gruhn, Claus Vielhauer, Jana Dittmann
89-98
A Method for Reducing the Risk of Errors in Digital Forensic Investigations
Graeme Horsman, Christopher Laing, Paul Vickers
99-106
Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance
Tobias Scheidat, Karl Kümmel, Claus Vielhauer
107-116
A New Approach to Commutative Watermarking-Encryption
Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang
117-130

Communication Security

Systematic Engineering of Control Protocols for Covert Channels
Steffen Wendzel, Jörg Keller
131-144
Efficiency of Secure Network Coding Schemes
Elke Franz, Stefan Pfennig, André Fischer
145-159
A New Approach for Private Searches on Public-Key Encrypted Data
Amar Siad
160-173
Multi-level Authentication Based Single Sign-On for IMS Services
M. Maachaoui, A. Abou El Kalam, C. Fraboul, A. Ait Ouahman
174-187

Part III: Extended Abstracts


Are 128 Bits Long Keys Possible in Watermarking?
Patrick Bas, Teddy Furon
191-191
Predicate-Tree Based Pretty Good Privacy of Data
William Perrizo, Arjun Roy
192-194
OOXML File Analysis of the July 22nd Terrorist Manual
Hanno Langweg
195-197
Privacy-Preserving Scheduling Mechanism for eHealth Systems
Milica Milutinovic, Vincent Naessens, Bart Decker
198-200
Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors
Jürgen Fuß, Wolfgang Kastl, Robert Kolmhofer, Georg Schönberger, Florian Wex
201-203
A Framework for Enforcing User-Based Authorization Policies on Packet Filter Firewalls
André Zúquete, Pedro Correia, Miguel Rocha
204-206
From Biometrics to Forensics: A Feature Collection and First Feature Fusion Approaches for Latent Fingerprint Detection Using a Chromatic White Light (CWL) Sensor
Robert Fischer, Tobias Kiertscher, Stefan Gruhn, Tobias Scheidat, Claus Vielhauer
207-210
Practical Revocable Anonymous Credentials
Jan Hajny, Lukas Malina
211-213

Part IV: Keynotes


Privacy Management in Global Organisations
Siani Pearson
217-237
From Panopticon to Fresnel, Dispelling a False Sense of Security
Jon Crowcroft, Ian Brown
238-242

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/