Information Systems Security
9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings
(Sprache: Englisch)
This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers...
Voraussichtlich lieferbar in 3 Tag(en)
versandkostenfrei
Buch (Kartoniert)
54.99 €
- Lastschrift, Kreditkarte, Paypal, Rechnung
- Kostenlose Rücksendung
- Ratenzahlung möglich
Produktdetails
Produktinformationen zu „Information Systems Security “
Klappentext zu „Information Systems Security “
This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical problems in information and systems security and related areas.
Inhaltsverzeichnis zu „Information Systems Security “
Challenges and Opportunities for Security with Differential Privacy.- An Encrypted In-Memory Column-Store: The Onion Selection Problem.- Risk Aware Approach to Data Confidentiality in Cloud Computing.- Jamming Resistant Schemes for Wireless Communication.- Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card.- Signcryption from Randomness Recoverable PKE Revisited.- Auctions with Rational Adversary.- A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services.- Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach.- Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management.- Secure States versus Secure Executions - From Access Control to Flow Control.- Monitoring for Slow Suspicious Activities Using a Target Centric Approach.- RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers.- Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme.- Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing.- Web Services Based Attacks against Image CAPTCHAs.- New Long-Term Glimpse of RC4 Stream Cipher.- A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs.- Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols.- Information Theoretical Analysis of Side-Channel Attack.- Efficient Multi-bit Image Steganography in Spatial Domain.- Evolutionary Multibit Grouping Steganographic Algorithm.- Let the Right One in: Discovering and Mitigating Permission Gaps.- A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET.- Recipient Anonymous Ciphertext-Policy Attribute Based Encryption.- Error Correction of Partially Exposed RSA Private Keys from MSB Side.- Efficient Enforcement of Privacy for Moving Object Trajectories.- An Administrative Model for Spatio-Temporal Role Based Access
... mehr
Control.- A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm.
... weniger
Bibliographische Angaben
- 2013, 2013, XVI, 404 Seiten, Maße: 15,5 x 23,6 cm, Kartoniert (TB), Englisch
- Herausgegeben: Aditya Bagchi, Indrakshi Ray
- Verlag: Springer, Berlin
- ISBN-10: 3642452035
- ISBN-13: 9783642452031
Sprache:
Englisch
Kommentar zu "Information Systems Security"
Schreiben Sie einen Kommentar zu "Information Systems Security".
Kommentar verfassen