Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: McDaniel, Patrick (Επιμελητής έκδοσης), Gupta, Shyam K. (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Σειρά:Lecture Notes in Computer Science, 4812
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Keynote Address
  • Security in Practice – Security-Usability Chasm
  • Network Security
  • Investigating the Impact of Real-World Factors on Internet Worm Propagation
  • An OS Security Protection Model for Defeating Attacks from Network
  • A Secure Intra-domain Routing Protocol for Wireless Mesh Networks
  • Cryptography
  • Genetic Algorithm Based Steganography Using Wavelets
  • Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol
  • A Near Optimal S-Box Design
  • Architectures and Systems
  • A Software Framework for Autonomic Security in Pervasive Environments
  • DLPKH – Distributed Logical Public-Key Hierarchy
  • Inference Control in Logic Databases as a Constraint Satisfaction Problem
  • Cryptanalysis
  • An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm
  • Cryptanalysis and the Improvement of Kim et al.’s Password Authentication Schemes
  • Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures
  • Keynote Talk
  • Data Privacy – Problems and Solutions
  • Protocols
  • Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals
  • A Secure and Efficient Multi-authority Proactive Election Scheme
  • Secure Transaction Management Protocols for MLS/DDBMS
  • Keynote Talk
  • The Curse of Ease of Access to the Internet
  • Short Papers
  • A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document
  • A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
  • Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks
  • A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation
  • On Knowledge-Based Classification of Abnormal BGP Events
  • Towards Automated Privilege Separation
  • Detection and Recognition
  • Constructing a “Common Cross Site Scripting Vulnerabilities Enumeration (CXE)” Using CWE and CVE
  • Performance Analysis for Multi Sensor Fingerprint Recognition System
  • Use of Dimensionality Reduction for Intrusion Detection.