Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2007.
|
Edición: | 1st ed. 2007. |
Colección: | Security and Cryptology ;
4812 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Keynote Address
- Security in Practice - Security-Usability Chasm
- Network Security
- Investigating the Impact of Real-World Factors on Internet Worm Propagation
- An OS Security Protection Model for Defeating Attacks from Network
- A Secure Intra-domain Routing Protocol for Wireless Mesh Networks
- Cryptography
- Genetic Algorithm Based Steganography Using Wavelets
- Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol
- A Near Optimal S-Box Design
- Architectures and Systems
- A Software Framework for Autonomic Security in Pervasive Environments
- DLPKH - Distributed Logical Public-Key Hierarchy
- Inference Control in Logic Databases as a Constraint Satisfaction Problem
- Cryptanalysis
- An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm
- Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes
- Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures
- Keynote Talk
- Data Privacy - Problems and Solutions
- Protocols
- Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals
- A Secure and Efficient Multi-authority Proactive Election Scheme
- Secure Transaction Management Protocols for MLS/DDBMS
- Keynote Talk
- The Curse of Ease of Access to the Internet
- Short Papers
- A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document
- A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
- Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks
- A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation
- On Knowledge-Based Classification of Abnormal BGP Events
- Towards Automated Privilege Separation
- Detection and Recognition
- Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration (CXE)" Using CWE and CVE
- Performance Analysis for Multi Sensor Fingerprint Recognition System
- Use of Dimensionality Reduction for Intrusion Detection.