Full Text Documents

Search


Table of Contents
Communications and Multimedia Security
David Chadwick, Bart Decker (Eds.)
Front Matter

Part I: Research Papers


Image and Handwriting Analysis

Robust Resampling Detection in Digital Images
Hieu Nguyen, Stefan Katzenbeisser
3-15
Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries
Karl Kümmel, Tobias Scheidat, Claus Vielhauer, Jana Dittmann
16-25
Security Analysis of Image-Based PUFs for Anti-counterfeiting
Saloomeh Shariati, François Koeune, François-Xavier Standaert
26-38

Authentication and Performance

Document authentication using 2D codes: Maximizing the decoding performance using statistical inference
Lamine Diong, Patrick Bas, Chloé Pelle, Wadih Sawaya
39-54
Data-Minimizing Authentication Goes Mobile
Patrik Bichsel, Jan Camenisch, Bart Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer
55-71
No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption
Zhuo Wei, Xuhua Ding, Robert Deng, Yongdong Wu
72-86

Part II: Work in Progress


Biometrics, Forensics and Watermarking

Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans
Andrey Makrushin, Tobias Kiertscher, Robert Fischer, Stefan Gruhn, Claus Vielhauer, Jana Dittmann
89-98
A Method for Reducing the Risk of Errors in Digital Forensic Investigations
Graeme Horsman, Christopher Laing, Paul Vickers
99-106
Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance
Tobias Scheidat, Karl Kümmel, Claus Vielhauer
107-116
A New Approach to Commutative Watermarking-Encryption
Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang
117-130

Communication Security

Systematic Engineering of Control Protocols for Covert Channels
Steffen Wendzel, Jörg Keller
131-144
Efficiency of Secure Network Coding Schemes
Elke Franz, Stefan Pfennig, André Fischer
145-159
A New Approach for Private Searches on Public-Key Encrypted Data
Amar Siad
160-173
Multi-level Authentication Based Single Sign-On for IMS Services
M. Maachaoui, A. Abou El Kalam, C. Fraboul, A. Ait Ouahman
174-187

Part III: Extended Abstracts


Are 128 Bits Long Keys Possible in Watermarking?
Patrick Bas, Teddy Furon
191-191
Predicate-Tree Based Pretty Good Privacy of Data
William Perrizo, Arjun Roy
192-194
OOXML File Analysis of the July 22nd Terrorist Manual
Hanno Langweg
195-197
Privacy-Preserving Scheduling Mechanism for eHealth Systems
Milica Milutinovic, Vincent Naessens, Bart Decker
198-200
Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors
Jürgen Fuß, Wolfgang Kastl, Robert Kolmhofer, Georg Schönberger, Florian Wex
201-203
A Framework for Enforcing User-Based Authorization Policies on Packet Filter Firewalls
André Zúquete, Pedro Correia, Miguel Rocha
204-206
From Biometrics to Forensics: A Feature Collection and First Feature Fusion Approaches for Latent Fingerprint Detection Using a Chromatic White Light (CWL) Sensor
Robert Fischer, Tobias Kiertscher, Stefan Gruhn, Tobias Scheidat, Claus Vielhauer
207-210
Practical Revocable Anonymous Credentials
Jan Hajny, Lukas Malina
211-213

Part IV: Keynotes


Privacy Management in Global Organisations
Siani Pearson
217-237
From Panopticon to Fresnel, Dispelling a False Sense of Security
Jon Crowcroft, Ian Brown
238-242

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/