Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2007.
|
Σειρά: | Lecture Notes in Computer Science,
4812 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Keynote Address
- Security in Practice – Security-Usability Chasm
- Network Security
- Investigating the Impact of Real-World Factors on Internet Worm Propagation
- An OS Security Protection Model for Defeating Attacks from Network
- A Secure Intra-domain Routing Protocol for Wireless Mesh Networks
- Cryptography
- Genetic Algorithm Based Steganography Using Wavelets
- Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol
- A Near Optimal S-Box Design
- Architectures and Systems
- A Software Framework for Autonomic Security in Pervasive Environments
- DLPKH – Distributed Logical Public-Key Hierarchy
- Inference Control in Logic Databases as a Constraint Satisfaction Problem
- Cryptanalysis
- An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm
- Cryptanalysis and the Improvement of Kim et al.’s Password Authentication Schemes
- Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures
- Keynote Talk
- Data Privacy – Problems and Solutions
- Protocols
- Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals
- A Secure and Efficient Multi-authority Proactive Election Scheme
- Secure Transaction Management Protocols for MLS/DDBMS
- Keynote Talk
- The Curse of Ease of Access to the Internet
- Short Papers
- A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document
- A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
- Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks
- A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation
- On Knowledge-Based Classification of Abnormal BGP Events
- Towards Automated Privilege Separation
- Detection and Recognition
- Constructing a “Common Cross Site Scripting Vulnerabilities Enumeration (CXE)” Using CWE and CVE
- Performance Analysis for Multi Sensor Fingerprint Recognition System
- Use of Dimensionality Reduction for Intrusion Detection.