Communications and multimedia security : proceedings of the IFIP TC6, TC11 and Austrian Computer Society joint working conference on communications and multimedia security, 1995
Author(s)
Bibliographic Information
Communications and multimedia security : proceedings of the IFIP TC6, TC11 and Austrian Computer Society joint working conference on communications and multimedia security, 1995
Chapman & Hall on behalf of the International Federation for Information Processing, 1995
Available at 8 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes indexes
Description and Table of Contents
Description
This volume covers many aspects of multimedia and communications security, from national security policies to file server architectures, from hypertext documents to specialized cryptographic algorithms. It provides the interested reader with a spectrum of up-to-the-minute knowledge on the topics covered.
Table of Contents
Issues of attack in distributed systems - a generic attack model. The puzzling science of information integrity. Covered trust values in distributed systems. File server architecture for an open distributed document system. A heuristic for securing hypertext systems. Video communication - security and quality issues. The graphical interface for secure mail. The network security reference model: its security subjects and their classification criteria. A strategic approach to a national security policy. The patient card and its position in a `new health care system'. Access controls for federated database environments - taxonomy of design choices. Authorization in multimedia conferencing systems. Authentication and key distribution in computer networks and distributed systems. Hidden signature schemes based on the discrete logarithm problem and related concepts. Digital signature schemes based on Lucas functions. Power permutations on prime residue classes. Hill cipher application to Multimedia Security. From `Steganographia' to subliminal communication. On the fractal nature of the set of all binary sequences with almost perfect linear complexity profile. Index of contributors. Keyword index.
by "Nielsen BookData"