메뉴 건너뛰기




Volumn , Issue , 2006, Pages 22-37

Security and trust in mobile multimedia

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84898245070     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59140-866-6.ch003     Document Type: Chapter
Times cited : (2)

References (24)
  • 1
    • 49049100147 scopus 로고    scopus 로고
    • Mitre technical report 2547 (secure computer system)
    • Bell, D., & Padula, L. L. (1996). Mitre technical report 2547 (secure computer system). Journal of Computer Security, 4(2), 239-263.
    • (1996) Journal of Computer Security , vol.4 , Issue.2 , pp. 239-263
    • Bell, D.1    Padula, L.L.2
  • 3
    • 33646693777 scopus 로고    scopus 로고
    • Retrieved August 1, 2003, from
    • Daid, M. (2000). Bluetooth security, parts 1, 2, and 3. Retrieved August 1, 2003, from http://www.palowireless.com/bluearticle/cc1_security1.asp and http://www.palowireless. com/bluearticle/cc1_security2.asp http://www.palowireless.com/bluearticle/cc1_security3.asp
    • (2000) Bluetooth Security, Parts 1, 2, and 3
    • Daid, M.1
  • 6
    • 0027697301 scopus 로고
    • The trustworthy digital camera: Restoring credibility to the photographic image
    • Friedman, G. (1993). The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions Consumer Electronics, 39(4), 905-910.
    • (1993) IEEE Transactions Consumer Electronics , vol.39 , Issue.4 , pp. 905-910
    • Friedman, G.1
  • 7
    • 0002544658 scopus 로고    scopus 로고
    • Software security and privacy risks in mobile e-commerce
    • Ghosh, K., & Swaminatha, T. (2001). Software security and privacy risks in mobile e-commerce. Communications of the ACM, 44(2), 51-57.
    • (2001) Communications of the ACM , vol.44 , Issue.2 , pp. 51-57
    • Ghosh, K.1    Swaminatha, T.2
  • 8
    • 0004256091 scopus 로고    scopus 로고
    • West Sussex, UK, John Wiley & Sons
    • Gollmann, D. (1999). Computer security. West Sussex, UK: John Wiley & Sons.
    • (1999) Computer Security
    • Gollmann, D.1
  • 9
    • 84898154298 scopus 로고    scopus 로고
    • (Tech. Rep. No. Scch-tr-0171). Hagenberg, Austria, Software Competence Center Hagenberg
    • Gruber, F., & Wolfmaier, K. (2001). State of the art in wireless communication (Tech. Rep. No. Scch-tr-0171). Hagenberg, Austria: Software Competence Center Hagenberg.
    • (2001) State of the Art In Wireless Communication
    • Gruber, F.1    Wolfmaier, K.2
  • 11
    • 0031996445 scopus 로고    scopus 로고
    • Steganography: Seeing the unseen
    • Johnson, F., & Jajodia, S. (1998). Steganography: Seeing the unseen. IEEE Computer, 31(2), 26-34.
    • (1998) IEEE Computer , vol.31 , Issue.2 , pp. 26-34
    • Johnson, F.1    Jajodia, S.2
  • 13
    • 0003509908 scopus 로고    scopus 로고
    • (Tech. Rep. No. jtc1/sc29/wg11 n3536). International Organisation for Standardization ISO/IEC JTC1/SC29/WG11, Dpt. Of Computer Science and Engineering
    • Koenen, R. (2000). Overview of the mpeg-4 standard (Tech. Rep. No. jtc1/sc29/wg11 n3536). International Organisation for Standardization ISO/IEC JTC1/SC29/WG11, Dpt. Of Computer Science and Engineering.
    • (2000) Overview of the Mpeg-4 Standard
    • Koenen, R.1
  • 14
    • 1342306801 scopus 로고    scopus 로고
    • Watermark-based copyright protection system security
    • Retrieved from
    • Kwok, S. H. (2003). Watermark-based copyright protection system security. Communications of the ACM, 46(10), 98-101. Retrieved from http://doi.acm.org/10.1145/944217.944219
    • (2003) Communications of the ACM , vol.46 , Issue.10 , pp. 98-101
    • Kwok, S.H.1
  • 15
    • 33646681378 scopus 로고    scopus 로고
    • Sans Institute. Retrieved August 1, 2003, from
    • Mahan, R. E. (2001). Security in wireless networks. Sans Institute. Retrieved August 1, 2003, from http://rr.sans.org/wireless/wireless_net3.php
    • (2001) Security In Wireless Networks
    • Mahan, R.E.1
  • 16
    • 84947943261 scopus 로고    scopus 로고
    • Protecting digital media content
    • Memon, N., & Wong, P. W. (1998). Protecting digital media content. Communications of the ACM, 41(7), 35-43.
    • (1998) Communications of the ACM , vol.41 , Issue.7 , pp. 35-43
    • Memon, N.1    Wong, P.W.2
  • 17
    • 0141878942 scopus 로고
    • NIS, (NSTISSI No. 4009 4009). NIS, Computer Science Department, Fanstord, California. Federal Standard 1037C
    • NIS. (1992). National information systems security (infosec) glossary (NSTISSI No. 4009 4009). NIS, Computer Science Department, Fanstord, California. Federal Standard 1037C.
    • (1992) National Information Systems Security (infosec) Glossary
  • 18
    • 0039187866 scopus 로고
    • (Tech. Rep. No. 122 122). Gothenburg, Sweden: Chalmers University of Technology, Department of Computer Engineering. Retrieved from
    • Olovsson, T. (1992). A structured approach to computer security (Tech. Rep. No. 122 122). Gothenburg, Sweden: Chalmers University of Technology, Department of Computer Engineering. Retrieved from http://www.securityfocus.com/library/661
    • (1992) A Structured Approach to Computer Security
    • Olovsson, T.1
  • 19
    • 0010385996 scopus 로고    scopus 로고
    • Technical report, Helsinki University of Technology, Dpt. Of Computer Science and Engineering
    • Pesonen, L. (1999). Gsm interception. Technical report, Helsinki University of Technology, Dpt. Of Computer Science and Engineering.
    • (1999) Gsm Interception
    • Pesonen, L.1
  • 20
    • 0000052619 scopus 로고    scopus 로고
    • Authentication, access control, and audit
    • Samarati, R. S. R. P. (1996). Authentication, access control, and audit. ACM Computing Surveys, 28(1), 241-243.
    • (1996) ACM Computing Surveys , vol.28 , Issue.1 , pp. 241-243
    • Samarati, R.S.R.P.1
  • 21
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • Sandhu, R., & Coyne, E. (1996). Role-based access control models. IEEE Computer, 29(2), 38-47.
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2
  • 23
    • 4244031545 scopus 로고    scopus 로고
    • Retrieved August 1, 2003, from
    • Vainio, J. (2000). Bluetooth security. Retrieved August 1, 2003, from http://www.niksula.cs.hut.fi/~jiitv/bluesec.html
    • (2000) Bluetooth Security
    • Vainio, J.1
  • 24
    • 0003706975 scopus 로고    scopus 로고
    • Walke, volume 1. B. G. Teubner Verlag, Stuttgart
    • Walke. (2000). Mobilfunknetze und ihre Protokolle, volume 1. B. G. Teubner Verlag, Stuttgart.
    • (2000) Mobilfunknetze Und Ihre Protokolle


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.