researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2004
2005
2010
2011
2012
2013
2014
Filter by Tag
OR
AND
NOT
1
XML
XML Schema
analysis
data-flow
mobile
multimedia
open-source
peer-to-peer
protocol
routing
rule-based
security
social
source-to-source
watermarking
Filter by Author
[+]
OR
AND
NOT
1
Anas Abou El Kalam
Andreas Uhl
Andrey Makrushin
André Zúquete
Bart De Decker
Bart Preneel
Christian Fraboul
Claus Vielhauer
Daniel Slamanig
Jana Dittmann
Jorn Lapon
Karl Kümmel
Lieven Desmet
Martin Steinebach
Milica Milutinovic
Ronny Merkel
Stefan Katzenbeisser
Stephen D. Wolthusen
Tobias Scheidat
Vincent Naessens
Filter by Top terms
[+]
OR
AND
NOT
1
algorithm
analysis
applications
approach
authentication
biometric
communications
conference
data
detection
encryption
ifip
management
mobile
multimedia
networks
privacy
secure
security
using
Communications and Multimedia Security (cms)
Editions
Publications
Viewing Publication 1 - 100 from 141
2014
Malicious MPLS Policy Engine Reconnaissance
Abdulrahman Al-Mutairi
,
Stephen D. Wolthusen
.
cms 2014
:
3-18
[doi]
Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems
Suaad S. Alarifi
,
Stephen D. Wolthusen
.
cms 2014
:
73-85
[doi]
The Fundamental Principle of Breach Prevention
Rui Melo Biscaia
.
cms 2014
:
154-156
[doi]
Secure Storage on Android with Context-Aware Access Control
Faysal Boukayoua
,
Jorn Lapon
,
Bart De Decker
,
Vincent Naessens
.
cms 2014
:
46-59
[doi]
Touchpad Input for Continuous Biometric Authentication
Alexander Chan
,
Tzipora Halevi
,
Nasir Memon
.
cms 2014
:
86-91
[doi]
A Study on Advanced Persistent Threats
Ping Chen
,
Lieven Desmet
,
Christophe Huygens
.
cms 2014
:
63-72
[doi]
An Approach to Information Security Policy Modeling for Enterprise Networks
Dmitry Chernyavskiy
,
Natalia G. Miloslavskaya
.
cms 2014
:
118-127
[doi]
Communications and Multimedia Security - 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings
Bart De Decker
,
André Zúquete
, editors,
Volume 8735 of
Lecture Notes in Computer Science
, Springer,
2014.
[doi]
Introduction to Attribute Based Searchable Encryption
Dalia Khader
.
cms 2014
:
131-135
[doi]
D-Shuffle for Prêt à Voter
Dalia Khader
.
cms 2014
:
104-117
[doi]
Risk Analysis of Physically Unclonable Functions
Andrea Kolberger
,
Ingrid Schaumüller-Bichl
,
Martin Deutschmann
.
cms 2014
:
136-139
[doi]
Decentralized Bootstrap for Social Overlay Networks
Rodolphe Marques
,
André Zúquete
.
cms 2014
:
140-143
[doi]
Enhancing Privacy with Quantum Networks
Paulo Mateus
,
Nikola Paunkovic
,
João Rodrigues
,
André Souto
.
cms 2014
:
147-153
[doi]
USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations
André Pereira
,
Manuel Eduardo Correia
,
Pedro Brandão
.
cms 2014
:
19-32
[doi]
Free Typed Text Using Keystroke Dynamics for Continuous Authentication
Paulo Pinto
,
Bernardo Patrão
,
Henrique Santos
.
cms 2014
:
33-45
[doi]
A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption
Bernd Zwattendorfer
,
Daniel Slamanig
,
Klaus Stranacher
,
Felix Hörandner
.
cms 2014
:
92-103
[doi]
2013
Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors
Boris Assanovich
,
William Puech
,
Iuliia Tkachenko
.
cms 2013
:
105-112
[doi]
SocACL: An ASP-Based Access Control Language for Online Social Networks
Edward Caprin
,
Yan Zhang
.
cms 2013
:
207-210
[doi]
Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings
Bart De Decker
,
Jana Dittmann
,
Christian Kraetzer
,
Claus Vielhauer
, editors,
Volume 8099 of
Lecture Notes in Computer Science
, Springer,
2013.
[doi]
Achieving Anonymity against Major Face Recognition Algorithms
Benedikt Driessen
,
Markus Dürmuth
.
cms 2013
:
18-33
[doi]
Hardware Based Security Enhanced Direct Memory Access
Marcel Eckert
,
Igor Podebrad
,
Bernd Klauer
.
cms 2013
:
145-151
[doi]
E-Learning of IT Security Threats: A Game Prototype for Children
Jana Fruth
,
Carsten Schulze
,
Marleen Rohde
,
Jana Dittmann
.
cms 2013
:
162-172
[doi]
Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation
Gábor György Gulyás
,
Sándor Imre
.
cms 2013
:
173-184
[doi]
Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack
Andreas Hasselberg
,
René Zimmermann
,
Christian Kraetzer
,
Tobias Scheidat
,
Claus Vielhauer
,
Karl Kümmel
.
cms 2013
:
85-94
[doi]
Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications
Mario Hildebrandt
,
Jennifer Sturm
,
Jana Dittmann
,
Claus Vielhauer
.
cms 2013
:
204-206
[doi]
Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans
Mario Hildebrandt
,
Andrey Makrushin
,
Kun Qian
,
Jana Dittmann
.
cms 2013
:
200-203
[doi]
Towards a Standardised Testsuite to Assess Fingerprint Matching Robustness: The StirMark Toolkit - Cross-Feature Type Comparisons
Jutta Hämmerle-Uhl
,
Michael Pober
,
Andreas Uhl
.
cms 2013
:
3-17
[doi]
Face Recognition from Degraded Images - Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing Dictionaries
Sabah A. Jassim
.
cms 2013
:
217-232
[doi]
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion
Huajian Liu
,
Yiyao Li
,
Martin Steinebach
.
cms 2013
:
95-104
[doi]
Detecting Resized Double JPEG Compressed Images - Using Support Vector Machine
Hieu Cuong Nguyen
,
Stefan Katzenbeisser
.
cms 2013
:
113-122
[doi]
Dedicated Hardware for Attribute-Based Credential Verification
Geoffrey Ottoy
,
Jorn Lapon
,
Vincent Naessens
,
Bart Preneel
,
Lieven De Strycker
.
cms 2013
:
50-65
[doi]
Trustworthy Software Development
Sachar Paulus
,
Nazila Gol Mohammadi
,
Thorsten Weyer
.
cms 2013
:
233-247
[doi]
Watermark Resynchronization: An Efficient Approach Based on Eulerian Tours around a Robust Skeleton
Konstantinos Raftopoulos
,
Klimis S. Ntalianis
,
Paraskevi K. Tzouveli
,
Nicolas Tsapatsoulis
,
Aleatha Parker-Wood
,
Marin Ferecatu
.
cms 2013
:
211-214
[doi]
Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption
Y. Sreenivasa Rao
,
Ratna Dutta
.
cms 2013
:
66-81
[doi]
Robust Hash Algorithms for Text
Martin Steinebach
,
Peter Klöckner
,
Nils Reimers
,
Dominik Wienand
,
Patrick Wolf
.
cms 2013
:
135-144
[doi]
Authentication with Time Features for Keystroke Dynamics on Touchscreens
Matthias Trojahn
,
Florian Arndt
,
Frank Ortmeier
.
cms 2013
:
197-199
[doi]
Client-Side Biometric Verification Based on Trusted Computing
Jan Vossaert
,
Jorn Lapon
,
Bart De Decker
,
Vincent Naessens
.
cms 2013
:
34-49
[doi]
Pit Stop for an Audio Steganography Algorithm
Andreas Westfeld
,
Jürgen Wurzer
,
Christian Fabian
,
Ernst Piller
.
cms 2013
:
123-134
[doi]
An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models
Xiaofeng Xia
.
cms 2013
:
185-194
[doi]
Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity
Takayuki Yamada
,
Seiichi Gohshi
,
Isao Echizen
.
cms 2013
:
152-161
[doi]
2012
Are 128 Bits Long Keys Possible in Watermarking?
Patrick Bas
,
Teddy Furon
.
cms 2012
:
191
[doi]
Data-Minimizing Authentication Goes Mobile
Patrik Bichsel
,
Jan Camenisch
,
Bart De Decker
,
Jorn Lapon
,
Vincent Naessens
,
Dieter Sommer
.
cms 2012
:
55-71
[doi]
From Panopticon to Fresnel, Dispelling a False Sense of Security
Jon Crowcroft
,
Ian Brown
.
cms 2012
:
238-242
[doi]
Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings
Bart De Decker
,
David W. Chadwick
, editors,
Volume 7394 of
Lecture Notes in Computer Science
, Springer,
2012.
[doi]
Document Authentication Using 2D Codes: Maximizing the Decoding Performance Using Statistical Inference
Mouhamadou L. Diong
,
Patrick Bas
,
Chloé Pelle
,
Wadih Sawaya
.
cms 2012
:
39-54
[doi]
From Biometrics to Forensics: A Feature Collection and First Feature Fusion Approaches for Latent Fingerprint Detection Using a Chromatic White Light (CWL) Sensor
Robert Fischer
,
Tobias Kiertscher
,
Stefan Gruhn
,
Tobias Scheidat
,
Claus Vielhauer
.
cms 2012
:
207-210
[doi]
Efficiency of Secure Network Coding Schemes
Elke Franz
,
Stefan Pfennig
,
André Fischer
.
cms 2012
:
145-159
[doi]
Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors
Jürgen Fuß
,
Wolfgang Kastl
,
Robert Kolmhofer
,
Georg Schönberger
,
Florian Wex
.
cms 2012
:
201-203
[doi]
Practical Revocable Anonymous Credentials
Jan Hajny
,
Lukas Malina
.
cms 2012
:
211-213
[doi]
A Method for Reducing the Risk of Errors in Digital Forensic Investigations
Graeme Horsman
,
Christopher Laing
,
Paul Vickers
.
cms 2012
:
99-106
[doi]
Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries
Karl Kümmel
,
Tobias Scheidat
,
Claus Vielhauer
,
Jana Dittmann
.
cms 2012
:
16-25
[doi]
OOXML File Analysis of the July 22nd Terrorist Manual
Hanno Langweg
.
cms 2012
:
195-197
[doi]
Multi-level Authentication Based Single Sign-On for IMS Services
Mohamed Maachaoui
,
Anas Abou El Kalam
,
Christian Fraboul
,
Abdellah Ait Ouahman
.
cms 2012
:
174-187
[doi]
Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans
Andrey Makrushin
,
Tobias Kiertscher
,
Robert Fischer
,
Stefan Gruhn
,
Claus Vielhauer
,
Jana Dittmann
.
cms 2012
:
89-98
[doi]
Privacy-Preserving Scheduling Mechanism for eHealth Systems
Milica Milutinovic
,
Vincent Naessens
,
Bart De Decker
.
cms 2012
:
198-200
[doi]
Robust Resampling Detection in Digital Images
Hieu Cuong Nguyen
,
Stefan Katzenbeisser
.
cms 2012
:
3-15
[doi]
Privacy Management in Global Organisations
Siani Pearson
.
cms 2012
:
217-237
[doi]
Predicate-Tree Based Pretty Good Privacy of Data
William Perrizo
,
Arjun G. Roy
.
cms 2012
:
192-194
[doi]
Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance
Tobias Scheidat
,
Karl Kümmel
,
Claus Vielhauer
.
cms 2012
:
107-116
[doi]
A New Approach to Commutative Watermarking-Encryption
Roland Schmitz
,
Shujun Li
,
Christos Grecos
,
Xinpeng Zhang
.
cms 2012
:
117-130
[doi]
Security Analysis of Image-Based PUFs for Anti-counterfeiting
Saloomeh Shariati
,
François Koeune
,
François-Xavier Standaert
.
cms 2012
:
26-38
[doi]
A New Approach for Private Searches on Public-Key Encrypted Data
Amar Siad
.
cms 2012
:
160-173
[doi]
No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption
Zhuo Wei
,
Xuhua Ding
,
Robert Huijie Deng
,
Yongdong Wu
.
cms 2012
:
72-86
[doi]
Systematic Engineering of Control Protocols for Covert Channels
Steffen Wendzel
,
Jörg Keller
.
cms 2012
:
131-144
[doi]
A Framework for Enforcing User-Based Authorization Policies on Packet Filter Firewalls
André Zúquete
,
Pedro Correia
,
Miguel Rocha
.
cms 2012
:
204-206
[doi]
2011
A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks
Mahdi R. Alaghband
,
Mohammad Reza Aref
.
cms 2011
:
18-31
[doi]
Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
Muhammad Asim
,
Luan Ibraimi
,
Milan Petkovic
.
cms 2011
:
244-246
[doi]
Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version)
Sven Bugiel
,
Stefan Nürnberger
,
Ahmad-Reza Sadeghi
,
Thomas Schneider 0003
.
cms 2011
:
32-44
[doi]
Dynamic Software Birthmark for Java Based on Heap Memory Analysis
Patrick P. F. Chan
,
Lucas Chi Kwong Hui
,
Siu-Ming Yiu
.
cms 2011
:
94-107
[doi]
Communications and Multimedia Security, 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings
Bart De Decker
,
Jorn Lapon
,
Vincent Naessens
,
Andreas Uhl
, editors,
Volume 7025 of
Lecture Notes in Computer Science
, Springer,
2011.
[doi]
A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning
Koen Decroix
,
Milica Milutinovic
,
Bart De Decker
,
Vincent Naessens
.
cms 2011
:
163-170
[doi]
Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms
Kurt Dietrich
,
Johannes Winter
,
Granit Luzhnica
,
Siegfried Podesser
.
cms 2011
:
45-58
[doi]
High Capacity FFT-Based Audio Watermarking
Mehdi Fallahpour
,
David Megías
.
cms 2011
:
235-237
[doi]
Security Warnings for Children's Smart Phones: A First Design Approach
Jana Fruth
,
Ronny Merkel
,
Jana Dittmann
.
cms 2011
:
241-243
[doi]
Efficient Prevention of Credit Card Leakage from Enterprise Networks
Matthew Hall
,
Reinoud Koornstra
,
Miranda Mowbray
.
cms 2011
:
238-240
[doi]
Mobile Identity Management
Jaap-Henk Hoepman
.
cms 2011
:
253
[doi]
Two-Factor Biometric Recognition with Integrated Tamper-Protection Watermarking
Reinhard Huber
,
Herbert Stögner
,
Andreas Uhl
.
cms 2011
:
72-84
[doi]
Motif-Based Attack Detection in Network Communication Graphs
Krzysztof Juszczyszyn
,
Grzegorz Kolaczek
.
cms 2011
:
206-213
[doi]
Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting
Karl Kümmel
,
Tobias Scheidat
,
Christian Arndt
,
Claus Vielhauer
.
cms 2011
:
85-93
[doi]
Analysis of Revocation Strategies for Anonymous Idemix Credentials
Jorn Lapon
,
Markulf Kohlweiss
,
Bart De Decker
,
Vincent Naessens
.
cms 2011
:
3-17
[doi]
Who Needs Facebook Anyway - Privacy and Sociality in Social Network Sites
Ronald E. Leenes
.
cms 2011
:
254
[doi]
Cryptanalysis of a SIP Authentication Scheme
Fuwen Liu
,
Hartmut König
.
cms 2011
:
134-143
[doi]
A Secure One-Way Authentication Protocol in IMS Context
Mohamed Maachaoui
,
Anas Abou El Kalam
,
Christian Fraboul
.
cms 2011
:
222-231
[doi]
Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature
Ronny Merkel
,
Jana Dittmann
,
Claus Vielhauer
.
cms 2011
:
59-71
[doi]
Secure Negotiation for Manual Authentication Protocols
Milica Milutinovic
,
Roel Peeters
,
Bart De Decker
.
cms 2011
:
214-221
[doi]
Radon Transform-Based Secure Image Hashing
Dung Q. Nguyen
,
Li Weng
,
Bart Preneel
.
cms 2011
:
186-193
[doi]
A Modular Test Platform for Evaluation of Security Protocols in NFC Applications
Geoffrey Ottoy
,
Jeroen Martens
,
Nick Saeys
,
Bart Preneel
,
Lieven De Strycker
,
Jean-Pierre Goemaere
,
Tom Hamelinckx
.
cms 2011
:
171-177
[doi]
Mapping between Classical Risk Management and Game Theoretical Approaches
Lisa Rajbhandari
,
Einar Snekkenes
.
cms 2011
:
147-154
[doi]
Digital Signatures: How Close Is Europe to Truly Interoperable Solutions?
Konstantinos Rantos
.
cms 2011
:
155-162
[doi]
GPU-Assisted AES Encryption Using GCM
Georg Schönberger
,
Jürgen Fuß
.
cms 2011
:
178-185
[doi]
Anonymous Authentication from Public-Key Encryption Revisited - (Extended Abstract)
Daniel Slamanig
.
cms 2011
:
247-249
[doi]
Low-Attention Forwarding for Mobile Network Covert Channels
Steffen Wendzel
,
Jörg Keller
.
cms 2011
:
122-133
[doi]
A Secure Perceptual Hash Algorithm for Image Content Authentication
Li Weng
,
Bart Preneel
.
cms 2011
:
108-121
[doi]
On Detecting Abrupt Changes in Network Entropy Time Series
Philipp Winter
,
Harald Lampesberger
,
Markus Zeilinger
,
Eckehard Hermann
.
cms 2011
:
194-205
[doi]
From Protecting a System to Protecting a Global Ecosystem
Moti Yung
.
cms 2011
:
255
[doi]
2010
Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal
Patrick Battistello
,
Cyril Delétré
.
cms 2010
:
154-165
[doi]
Throwing a MonkeyWrench into Web Attackers Plans
Armin Büscher
,
Michael Meier
,
Ralf Benzmüller
.
cms 2010
:
28-39
[doi]
Anonymous Client Authentication for Transport Layer Security
Kurt Dietrich
.
cms 2010
:
268-280
[doi]
Business and IT Continuity Benchmarking
Wolfgang Neudorfer
,
Louis Marinos
,
Ingrid Schaumüller-Bichl
.
cms 2010
:
118-129
[doi]
A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)
Nicolas Racz
,
Edgar Weippl
,
Andreas Seufert
.
cms 2010
:
106-117
[doi]
Sign in
or
sign up
to see more results.