Now showing 1 - 3 of 3
No Thumbnail Available
Publication

Context-aware service based on secure mobile agents

2002 , Pinsdorf, U. , Peters, J. , Hoffmann, M. , Gupta, P.

In this paper we introduce the concept of context-aware services as an extended form of locationbased services. We describe a new architecture for realizing context-aware services which has a number of key benefits. This architecture relays on mobile software agents as security-centric middleware. Our approach allows to combine disjunct databases by establishing applicationdependant links between remote data sets with a proprietary access. We describe all necessary roles and places to establish a multilateral security concept for all participants.

No Thumbnail Available
Publication

Combined fingerprinting attacks against digital audio watermarking: Methods, results and solutions

2002 , Steinebach, M. , Dittmann, J. , Saar, E.

The methods for secure customer identification by digital fingerprinting for audio data are discussed. The algorithms by D. Boneh et al. (Proc. CRYPTO'95, p.452-465, 1995) and Joerg Schwenk et al. (Proceedings of SPIE, vol. 3657, p.24-29, Jan. 1999) are discussed and are then combined with an audio watermarking algorithm for practical evaluation of their coalition resistance to detect illegal copies. Test results are provided and the security performance against different types of coalition attacks is evaluated.

No Thumbnail Available
Publication

Vulnerabilities and security limitations of current IP telephony systems

2001 , Ackermann, R. , Schumacher, M. , Roedig, U. , Steinmetz, R.

Within the traditional telephone system a certain level of quality and security has been established over the years. If we try to use IP Telephony systems as a core part of our future communication infrastructure (e.g. as classical PBX enhancement or replacement) continuous high availability, stable and error-free operation and the protection of the privacy of the spoken word are challenges, that definitely have to be met. Since manufacturers start deploying new end systems and infrastructure components rather fast now - a critical inspection of their security features and vulnerabilities is mandatory. The critical presentation of the theoretical background of certain vulnerabilities, testing and attacking tools and the evaluation results reveals, that well-known security flaws become part of implementations in the new application area again and the security level of a number of examined solutions is rather insufficient.