top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Systems Security [[electronic resource] ] : 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings / / edited by Aditya Bagchi, Indrakshi Ray
Information Systems Security [[electronic resource] ] : 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings / / edited by Aditya Bagchi, Indrakshi Ray
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVI, 404 p. 70 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Systems and Data Security
Cryptology
Computer Communication Networks
ISBN 3-642-45204-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Challenges and Opportunities for Security with Differential Privacy -- An Encrypted In-Memory Column-Store: The Onion Selection Problem -- Risk Aware Approach to Data Confidentiality in Cloud Computing -- Jamming Resistant Schemes for Wireless Communication -- Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card -- Signcryption from Randomness Recoverable PKE Revisited -- Auctions with Rational Adversary -- A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services -- Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach -- Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management -- Secure States versus Secure Executions - From Access Control to Flow Control -- Monitoring for Slow Suspicious Activities Using a Target Centric Approach -- RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers -- Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme -- Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing -- Web Services Based Attacks against Image CAPTCHAs -- New Long-Term Glimpse of RC4 Stream Cipher -- A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs -- Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols -- Information Theoretical Analysis of Side-Channel Attack -- Efficient Multi-bit Image Steganography in Spatial Domain -- Evolutionary Multibit Grouping Steganographic Algorithm -- Let the Right One in: Discovering and Mitigating Permission Gaps -- A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET -- Recipient Anonymous Ciphertext-Policy Attribute Based Encryption -- Error Correction of Partially Exposed RSA Private Keys from MSB Side -- Efficient Enforcement of Privacy for Moving Object Trajectories -- An Administrative Model for Spatio-Temporal Role Based Access Control -- A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm.
Record Nr. UNISA-996465508303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Systems Security : 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings / / edited by Aditya Bagchi, Indrakshi Ray
Information Systems Security : 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings / / edited by Aditya Bagchi, Indrakshi Ray
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVI, 404 p. 70 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Systems and Data Security
Cryptology
Computer Communication Networks
ISBN 3-642-45204-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Challenges and Opportunities for Security with Differential Privacy -- An Encrypted In-Memory Column-Store: The Onion Selection Problem -- Risk Aware Approach to Data Confidentiality in Cloud Computing -- Jamming Resistant Schemes for Wireless Communication -- Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card -- Signcryption from Randomness Recoverable PKE Revisited -- Auctions with Rational Adversary -- A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services -- Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach -- Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management -- Secure States versus Secure Executions - From Access Control to Flow Control -- Monitoring for Slow Suspicious Activities Using a Target Centric Approach -- RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers -- Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme -- Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing -- Web Services Based Attacks against Image CAPTCHAs -- New Long-Term Glimpse of RC4 Stream Cipher -- A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs -- Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols -- Information Theoretical Analysis of Side-Channel Attack -- Efficient Multi-bit Image Steganography in Spatial Domain -- Evolutionary Multibit Grouping Steganographic Algorithm -- Let the Right One in: Discovering and Mitigating Permission Gaps -- A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET -- Recipient Anonymous Ciphertext-Policy Attribute Based Encryption -- Error Correction of Partially Exposed RSA Private Keys from MSB Side -- Efficient Enforcement of Privacy for Moving Object Trajectories -- An Administrative Model for Spatio-Temporal Role Based Access Control -- A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm.
Record Nr. UNINA-9910482973603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Systems Security [[electronic resource] ] : Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings / / edited by Aditya Bagchi, Vijayalakshmi Atluri
Information Systems Security [[electronic resource] ] : Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings / / edited by Aditya Bagchi, Vijayalakshmi Atluri
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XVI, 384 p.)
Disciplina 05.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Computer security
Computers and civilization
Management information systems
Computer science
Information storage and retrieval
Cryptology
Computer Communication Networks
Systems and Data Security
Computers and Society
Management of Computing and Information Systems
Information Storage and Retrieval
ISBN 3-540-68963-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- Privacy in the Electronic Society -- A Data Sharing Agreement Framework -- Password Exhaustion: Predicting the End of Password Usefulness -- Network Monitoring for Security and Forensics -- Data and Application Security -- Fairness Strategy for Multilevel Secure Concurrency Control Protocol -- Optimistic Anonymous Participation in Inter-organizational Workflow Instances -- O2O: Virtual Private Organizations to Manage Security Policy Interoperability -- Privacy Preserving Web-Based Email -- Access Control -- Context-Aware Provisional Access Control -- LRBAC: A Location-Aware Role-Based Access Control Model -- Extending Context Descriptions in Semantics-Aware Access Control -- Specification and Realization of Access Control in SPKI/SDSI -- Key Management and Security in Wireless Networks -- Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack -- An Efficient Key Assignment Scheme for Access Control in a Hierarchy -- Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers -- Secure Data Management in Reactive Sensor Networks -- Threat Analysis, Detection and Recovery -- Security Ontology: Simulating Threats to Corporate Assets -- Two-Stage Credit Card Fraud Detection Using Sequence Alignment -- New Malicious Code Detection Using Variable Length n-grams -- A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes -- Cryptography and Encryption -- An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack -- A Partial Image Encryption Method with Pseudo Random Sequences -- High Capacity Lossless Data Hiding -- An Implementation and Evaluation of Online Disk Encryption for Windows Systems -- Short Papers and Research Reports -- Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract) -- A Survey of Control-Flow Obfuscations -- Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments -- Secure Itineraries Framework for Mobile Agent Systems -- Malafide Intension Based Detection of Privacy Violation in Information System -- Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report) -- Towards a Formal Specification Method for Enterprise Information System Security -- Recent Research on Privacy Preserving Data Mining.
Record Nr. UNISA-996466141503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedings / / Aditya Bagchi, Vijayalakshmi Atluri (eds.)
Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedings / / Aditya Bagchi, Vijayalakshmi Atluri (eds.)
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, 2006
Descrizione fisica 1 online resource (XVI, 384 p.)
Disciplina 05.8
Altri autori (Persone) BagchiAditya
AtluriVijayalaksmi
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computer security
Computers - Access control
ISBN 3-540-68963-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- Privacy in the Electronic Society -- A Data Sharing Agreement Framework -- Password Exhaustion: Predicting the End of Password Usefulness -- Network Monitoring for Security and Forensics -- Data and Application Security -- Fairness Strategy for Multilevel Secure Concurrency Control Protocol -- Optimistic Anonymous Participation in Inter-organizational Workflow Instances -- O2O: Virtual Private Organizations to Manage Security Policy Interoperability -- Privacy Preserving Web-Based Email -- Access Control -- Context-Aware Provisional Access Control -- LRBAC: A Location-Aware Role-Based Access Control Model -- Extending Context Descriptions in Semantics-Aware Access Control -- Specification and Realization of Access Control in SPKI/SDSI -- Key Management and Security in Wireless Networks -- Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack -- An Efficient Key Assignment Scheme for Access Control in a Hierarchy -- Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers -- Secure Data Management in Reactive Sensor Networks -- Threat Analysis, Detection and Recovery -- Security Ontology: Simulating Threats to Corporate Assets -- Two-Stage Credit Card Fraud Detection Using Sequence Alignment -- New Malicious Code Detection Using Variable Length n-grams -- A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes -- Cryptography and Encryption -- An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack -- A Partial Image Encryption Method with Pseudo Random Sequences -- High Capacity Lossless Data Hiding -- An Implementation and Evaluation of Online Disk Encryption for Windows Systems -- Short Papers and Research Reports -- Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract) -- A Survey of Control-Flow Obfuscations -- Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments -- Secure Itineraries Framework for Mobile Agent Systems -- Malafide Intension Based Detection of Privacy Violation in Information System -- Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report) -- Towards a Formal Specification Method for Enterprise Information System Security -- Recent Research on Privacy Preserving Data Mining.
Altri titoli varianti ICISS 2006
Record Nr. UNINA-9910484729403321
Berlin ; ; New York, : Springer, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui