LEADER 04174nam 22009135 450 001 996465923403316 005 20200706161206.0 010 $a3-642-25560-4 024 7 $a10.1007/978-3-642-25560-1 035 $a(CKB)3400000000024096 035 $a(SSID)ssj0000610004 035 $a(PQKBManifestationID)11426259 035 $a(PQKBTitleCode)TC0000610004 035 $a(PQKBWorkID)10623402 035 $a(PQKB)10481345 035 $a(DE-He213)978-3-642-25560-1 035 $a(MiAaPQ)EBC6283793 035 $a(MiAaPQ)EBC5578558 035 $a(Au-PeEL)EBL5578558 035 $a(OCoLC)761697573 035 $a(PPN)157511065 035 $a(EXLCZ)993400000000024096 100 $a20111110d2011 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Systems Security$b[electronic resource] $e7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings /$fedited by Sushil Jajodia, Chandan Mazumdar 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (XV, 388 p.) 225 1 $aSecurity and Cryptology ;$v7093 300 $aRevised conference papers. 311 $a3-642-25559-0 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011. The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security. 410 0$aSecurity and Cryptology ;$v7093 606 $aComputer communication systems 606 $aComputer security 606 $aApplication software 606 $aInformation storage and retrieval 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aApplication software. 615 0$aInformation storage and retrieval. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science). 615 14$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aInformation Storage and Retrieval. 615 24$aManagement of Computing and Information Systems. 615 24$aCryptology. 676 $a005.8 686 $a004$2sdnb 686 $aDAT 461f$2stub 686 $aDAT 959f$2stub 686 $aSS 4800$2rvk 702 $aJajodia$b Sushil$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMazumdar$b Chandan$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aICISS 2011 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465923403316 996 $aInformation Systems Security$9771916 997 $aUNISA