Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings

Bibliographic Details
Other Authors: McDaniel, Patrick (Editor), Gupta, Shyam K. (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2007, 2007
Edition:1st ed. 2007
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03641nmm a2200433 u 4500
001 EB000379974
003 EBX01000000000000000233026
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9783540770862 
100 1 |a McDaniel, Patrick  |e [editor] 
245 0 0 |a Information Systems Security  |h Elektronische Ressource  |b Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings  |c edited by Patrick McDaniel, Shyam K. Gupta 
250 |a 1st ed. 2007 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2007, 2007 
300 |a XIII, 326 p  |b online resource 
505 0 |a Constructing a “Common Cross Site Scripting Vulnerabilities Enumeration (CXE)” Using CWE and CVE -- Performance Analysis for Multi Sensor Fingerprint Recognition System -- Use of Dimensionality Reduction for Intrusion Detection 
505 0 |a Keynote Address -- Security in Practice – Security-Usability Chasm -- Network Security -- Investigating the Impact of Real-World Factors on Internet Worm Propagation -- An OS Security Protection Model for Defeating Attacks from Network -- A Secure Intra-domain Routing Protocol for Wireless Mesh Networks -- Cryptography -- Genetic Algorithm Based Steganography Using Wavelets -- Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol -- A Near Optimal S-Box Design -- Architectures and Systems -- A Software Framework for Autonomic Security in Pervasive Environments -- DLPKH – Distributed Logical Public-Key Hierarchy -- Inference Control in Logic Databases as a Constraint Satisfaction Problem -- Cryptanalysis -- An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm -- Cryptanalysis and the Improvement of Kim et al.’s Password Authentication Schemes --  
505 0 |a Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures -- Keynote Talk -- Data Privacy – Problems and Solutions -- Protocols -- Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals -- A Secure and Efficient Multi-authority Proactive Election Scheme -- Secure Transaction Management Protocols for MLS/DDBMS -- Keynote Talk -- The Curse of Ease of Access to the Internet -- Short Papers -- A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document -- A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks -- Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks -- A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation -- On Knowledge-Based Classification of Abnormal BGP Events -- Towards Automated PrivilegeSeparation -- Detection and Recognition --  
653 |a Computer Communication Networks 
653 |a Computers and Society 
653 |a Cryptography 
653 |a Information Storage and Retrieval 
653 |a Electronic data processing / Management 
653 |a Information storage and retrieval systems 
653 |a Computer networks  
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Data and Information Security 
653 |a IT Operations 
653 |a Computers and civilization 
700 1 |a Gupta, Shyam K.  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-540-77086-2 
856 4 0 |u https://doi.org/10.1007/978-3-540-77086-2?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.824