|  | 
 List of accepted papers!
 28 papers out of 145 submissions (about 19%) have been accepted as full paper for oral presentation and inclusion in the conference proceedings.
Full papers are allowed to have a maximum
of 10 pages.  (2 additional pages are possible, but each additional page will be charged 100 Euro.)
 
 Additionally, 18 papers (about 13 %) have been accepted as 'work in progress'-paper for poster presentation! These papers will be included in the final conference proceedings as 2 page extended abstract (no additional page possible).
 
	   
	   
 List of fully accepted papers - oral presentation (proceedings: max. 10 pages, additional page (max. 2) 100 Euro):007. Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets018. Fast Contract Signing with Batch Oblivious Transfer
 020. Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-hoc Networks
 021. A Key Embedded Video Codec for Secure Video Multicast
 023. Effective Protection Against Phishing and Web Spoofing
 027. An Instruction Set Extension for Fast and Memory-Efficient AES Implementation
 028. On reversibility of random binning techniques: multimedia perspectives
 030. Video Surveillance: A Distributed Approach to protect Privacy
 031. Personal Entertainment Domain: Concept and Design
 032. A Graph-Theoretic Approach to Steganography
 037. Privacy-Preserving Electronic Health Records
 039. Assessment of Palm OS susceptibility to malicious code threats
 040. Trust and rights in multimedia content management systems
 043. Signature Amortization Using Multiple Connected Chains
 050. Secure XMaiL or How to get rid of legacy code in secure E-Mail applications
 064. Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics
 070. Puzzle - A Novel Video Encryption Algorithm
 081. Using XACML for Privacy Control in SAML-based Identity Federations
 082. Selective Image Encryption using JBIG
 085. Implementation of Credit-Control Authorization with embedded the Mobile IPv6 Authentication
 090. Polymorphic Code Detection with GA optimized Markov Models
 091. Integrating XML Linked Time-stamps in OASIS Digital Signature Services
 092. Decentralised Access Control in 802.11 Networks
 106. Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme
 119. A Secure Context Management for QoS-aware Vertical Handovers in 4G Networks
 124. Multimodal Biometrics for Voice and Handwriting
 129. Trustworthy Verification and Visualisation of Multiple XML-Signatures
 137. Self-Healing Key Distribution Schemes with Sponsorization
 
 
           
	   
  List of papers accepted for work in progress session - poster presentation (proceedings: 2 pages extended abstract, no additional page possible): 008. Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics011. Efficient Session Resume Protocol in Secure Aeronautical Telecommunication Network
 034. Digital signatures based on invertible watermarks for video authentication
 036. A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents
 077. Semantically Extended Digital Watermarking Model for Multimedia Content
 078. Applying the LRCA algorithm to JPEG format
 084. An Evenhanded Certified Email System for Contract Signing
 087. Multi-End-to-End Authentication Scheme for Composite MPEG-4 Stream
 088. An Architecture for Secure Policy Enforcement in E-Government Services Deployment
 098. Some Critical Aspects on the PKIX Time Stamp Protocol
 107. Traitor Tracing for Anonymous Attacks
 108. INVUS: INtelligent VUlnerability Scanner
 110. A theoretical approach to the WYSIWYS requirement
 130. A Covert Channel for Hidden Text Files and SMS messages Transfer
 133. Efficient Key Distribution for Closed Meetings in the Internet
 135. Certificate Status Checking in the Restricted Environment of Smart Cards
 138. Personal Rights Management - enabling privacy rights in digital online content
 143. Biometrics: Different approaches for using Gaussian Mixture Models in Handwriting
 
 
 
 
 |