Information Systems Security Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings
Other Authors: | , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2007, 2007
|
Edition: | 1st ed. 2007 |
Series: | Security and Cryptology
|
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- Constructing a “Common Cross Site Scripting Vulnerabilities Enumeration (CXE)” Using CWE and CVE
- Performance Analysis for Multi Sensor Fingerprint Recognition System
- Use of Dimensionality Reduction for Intrusion Detection
- Keynote Address
- Security in Practice – Security-Usability Chasm
- Network Security
- Investigating the Impact of Real-World Factors on Internet Worm Propagation
- An OS Security Protection Model for Defeating Attacks from Network
- A Secure Intra-domain Routing Protocol for Wireless Mesh Networks
- Cryptography
- Genetic Algorithm Based Steganography Using Wavelets
- Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol
- A Near Optimal S-Box Design
- Architectures and Systems
- A Software Framework for Autonomic Security in Pervasive Environments
- DLPKH – Distributed Logical Public-Key Hierarchy
- Inference Control in Logic Databases as a Constraint Satisfaction Problem
- Cryptanalysis
- An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm
- Cryptanalysis and the Improvement of Kim et al.’s Password Authentication Schemes
- Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures
- Keynote Talk
- Data Privacy – Problems and Solutions
- Protocols
- Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals
- A Secure and Efficient Multi-authority Proactive Election Scheme
- Secure Transaction Management Protocols for MLS/DDBMS
- Keynote Talk
- The Curse of Ease of Access to the Internet
- Short Papers
- A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document
- A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
- Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks
- A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation
- On Knowledge-Based Classification of Abnormal BGP Events
- Towards Automated PrivilegeSeparation
- Detection and Recognition