Information Systems Security 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings /
This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2012.
|
Σειρά: | Lecture Notes in Computer Science,
7671 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Fighting Malicious Software
- VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security
- Security Assessment of Node.js Platform
- Foundations of Dynamic Access Control
- Risk-Aware RBAC Sessions
- A Cognitive Trust Model for Access Control Framework i MANET
- Trust-OrBAC: A Trust Access Control Model in Multi-Organization Environments
- On Policies and Intents
- ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel
- Keyless Steganography in Spatial Domain Using Energetic Pixels
- Fuzzy Inference Rule Based Reversible Watermarking for Digital Images
- Secure Trust Metadata Management for Mobile Ad-Hoc Networks
- Defence against Wormhole Attacks in Wireless Mesh Networks
- A Novel Key Update Protocol in Mobile Sensor Networks
- Autonomous Certification with List-Based Revocation for Secure V2V Communication
- Mitigating Insider Threat on Database Integrity
- Coercion Resistant MIX for Electronic Auction
- Verification of Money Atomicity in Digital Cash Based Payment System
- Cryptographic Analysis of a Type of Sequence Generators
- Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs
- Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks
- Tracking Insecure Information Flows: A Prototype Evaluator in ASF+SDF
- Attacking Image Based CAPTCHAs Using Image Recognition Techniques
- Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach.