top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information systems security : third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings / / Patrick McDaniel, Shyam K. Gupta (editors)
Information systems security : third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings / / Patrick McDaniel, Shyam K. Gupta (editors)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (XIII, 326 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
ISBN 3-540-77086-0
Classificazione DAT 460f
DAT 461f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Address -- Security in Practice – Security-Usability Chasm -- Network Security -- Investigating the Impact of Real-World Factors on Internet Worm Propagation -- An OS Security Protection Model for Defeating Attacks from Network -- A Secure Intra-domain Routing Protocol for Wireless Mesh Networks -- Cryptography -- Genetic Algorithm Based Steganography Using Wavelets -- Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol -- A Near Optimal S-Box Design -- Architectures and Systems -- A Software Framework for Autonomic Security in Pervasive Environments -- DLPKH – Distributed Logical Public-Key Hierarchy -- Inference Control in Logic Databases as a Constraint Satisfaction Problem -- Cryptanalysis -- An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm -- Cryptanalysis and the Improvement of Kim et al.’s Password Authentication Schemes -- Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures -- Keynote Talk -- Data Privacy – Problems and Solutions -- Protocols -- Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals -- A Secure and Efficient Multi-authority Proactive Election Scheme -- Secure Transaction Management Protocols for MLS/DDBMS -- Keynote Talk -- The Curse of Ease of Access to the Internet -- Short Papers -- A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document -- A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks -- Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks -- A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation -- On Knowledge-Based Classification of Abnormal BGP Events -- Towards Automated Privilege Separation -- Detection and Recognition -- Constructing a “Common Cross Site Scripting Vulnerabilities Enumeration (CXE)” Using CWE and CVE -- Performance Analysis for Multi Sensor Fingerprint Recognition System -- Use of Dimensionality Reduction for Intrusion Detection.
Record Nr. UNINA-9910484514603321
Berlin, Heidelberg : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information systems security : third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings / / Patrick McDaniel, Shyam K. Gupta (editors)
Information systems security : third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings / / Patrick McDaniel, Shyam K. Gupta (editors)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (XIII, 326 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
ISBN 3-540-77086-0
Classificazione DAT 460f
DAT 461f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Address -- Security in Practice – Security-Usability Chasm -- Network Security -- Investigating the Impact of Real-World Factors on Internet Worm Propagation -- An OS Security Protection Model for Defeating Attacks from Network -- A Secure Intra-domain Routing Protocol for Wireless Mesh Networks -- Cryptography -- Genetic Algorithm Based Steganography Using Wavelets -- Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol -- A Near Optimal S-Box Design -- Architectures and Systems -- A Software Framework for Autonomic Security in Pervasive Environments -- DLPKH – Distributed Logical Public-Key Hierarchy -- Inference Control in Logic Databases as a Constraint Satisfaction Problem -- Cryptanalysis -- An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm -- Cryptanalysis and the Improvement of Kim et al.’s Password Authentication Schemes -- Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures -- Keynote Talk -- Data Privacy – Problems and Solutions -- Protocols -- Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals -- A Secure and Efficient Multi-authority Proactive Election Scheme -- Secure Transaction Management Protocols for MLS/DDBMS -- Keynote Talk -- The Curse of Ease of Access to the Internet -- Short Papers -- A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document -- A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks -- Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks -- A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation -- On Knowledge-Based Classification of Abnormal BGP Events -- Towards Automated Privilege Separation -- Detection and Recognition -- Constructing a “Common Cross Site Scripting Vulnerabilities Enumeration (CXE)” Using CWE and CVE -- Performance Analysis for Multi Sensor Fingerprint Recognition System -- Use of Dimensionality Reduction for Intrusion Detection.
Record Nr. UNISA-996465990803316
Berlin, Heidelberg : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui