LEADER 05008nam 22006495 450 001 996465508303316 005 20200705010800.0 010 $a3-642-45204-3 024 7 $a10.1007/978-3-642-45204-8 035 $a(CKB)3710000000078876 035 $a(DE-He213)978-3-642-45204-8 035 $a(SSID)ssj0001091019 035 $a(PQKBManifestationID)11618087 035 $a(PQKBTitleCode)TC0001091019 035 $a(PQKBWorkID)11025713 035 $a(PQKB)10695067 035 $a(MiAaPQ)EBC3093176 035 $a(PPN)176117903 035 $a(EXLCZ)993710000000078876 100 $a20131212d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Systems Security$b[electronic resource] $e9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings /$fedited by Aditya Bagchi, Indrakshi Ray 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XVI, 404 p. 70 illus.) 225 1 $aSecurity and Cryptology ;$v8303 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-45203-5 327 $aChallenges and Opportunities for Security with Differential Privacy -- An Encrypted In-Memory Column-Store: The Onion Selection Problem -- Risk Aware Approach to Data Confidentiality in Cloud Computing -- Jamming Resistant Schemes for Wireless Communication -- Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card -- Signcryption from Randomness Recoverable PKE Revisited -- Auctions with Rational Adversary -- A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services -- Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach -- Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management -- Secure States versus Secure Executions - From Access Control to Flow Control -- Monitoring for Slow Suspicious Activities Using a Target Centric Approach -- RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers -- Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme -- Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing -- Web Services Based Attacks against Image CAPTCHAs -- New Long-Term Glimpse of RC4 Stream Cipher -- A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs -- Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols -- Information Theoretical Analysis of Side-Channel Attack -- Efficient Multi-bit Image Steganography in Spatial Domain -- Evolutionary Multibit Grouping Steganographic Algorithm -- Let the Right One in: Discovering and Mitigating Permission Gaps -- A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET -- Recipient Anonymous Ciphertext-Policy Attribute Based Encryption -- Error Correction of Partially Exposed RSA Private Keys from MSB Side -- Efficient Enforcement of Privacy for Moving Object Trajectories -- An Administrative Model for Spatio-Temporal Role Based Access Control -- A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm. 330 $aThis book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical problems in information and systems security and related areas. 410 0$aSecurity and Cryptology ;$v8303 606 $aComputer security 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aBagchi$b Aditya$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRay$b Indrakshi$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465508303316 996 $aInformation Systems Security$9771916 997 $aUNISA