Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings /

This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 8...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Bagchi, Aditya (Επιμελητής έκδοσης), Ray, Indrakshi (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
Σειρά:Lecture Notes in Computer Science, 8303
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Challenges and Opportunities for Security with Differential Privacy
  • An Encrypted In-Memory Column-Store: The Onion Selection Problem
  • Risk Aware Approach to Data Confidentiality in Cloud Computing
  • Jamming Resistant Schemes for Wireless Communication
  • Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card
  • Signcryption from Randomness Recoverable PKE Revisited
  • Auctions with Rational Adversary
  • A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services
  • Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach
  • Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management
  • Secure States versus Secure Executions - From Access Control to Flow Control
  • Monitoring for Slow Suspicious Activities Using a Target Centric Approach
  • RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers
  • Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme
  • Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing
  • Web Services Based Attacks against Image CAPTCHAs
  • New Long-Term Glimpse of RC4 Stream Cipher
  • A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs
  • Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols
  • Information Theoretical Analysis of Side-Channel Attack
  • Efficient Multi-bit Image Steganography in Spatial Domain
  • Evolutionary Multibit Grouping Steganographic Algorithm
  • Let the Right One in: Discovering and Mitigating Permission Gaps
  • A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET
  • Recipient Anonymous Ciphertext-Policy Attribute Based Encryption
  • Error Correction of Partially Exposed RSA Private Keys from MSB Side
  • Efficient Enforcement of Privacy for Moving Object Trajectories
  • An Administrative Model for Spatio-Temporal Role Based Access Control
  • A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm.