top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Systems Security [[electronic resource] ] : 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings / / edited by Atul Prakash, Rudrapatna Shyamasundar
Information Systems Security [[electronic resource] ] : 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings / / edited by Atul Prakash, Rudrapatna Shyamasundar
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XXIV, 478 p. 163 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Systems and Data Security
Cryptology
Computer Communication Networks
ISBN 3-319-13841-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security inferences -- Security policies -- Security user interfaces -- Security attacks -- Malware detection -- Forensics.- Location based security services.
Record Nr. UNISA-996211264803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Systems Security [[electronic resource] ] : 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings / / edited by Atul Prakash, Rudrapatna Shyamasundar
Information Systems Security [[electronic resource] ] : 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings / / edited by Atul Prakash, Rudrapatna Shyamasundar
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XXIV, 478 p. 163 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Systems and Data Security
Cryptology
Computer Communication Networks
ISBN 3-319-13841-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security inferences -- Security policies -- Security user interfaces -- Security attacks -- Malware detection -- Forensics.- Location based security services.
Record Nr. UNINA-9910484083303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Systems Security [[electronic resource] ] : 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings / / edited by Atul Prakash
Information Systems Security [[electronic resource] ] : 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings / / edited by Atul Prakash
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XV, 327 p.)
Disciplina 004n/a
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Computer security
Information storage and retrieval
Management information systems
Computer science
Biometrics (Biology)
Computer Communication Networks
Cryptology
Systems and Data Security
Information Storage and Retrieval
Management of Computing and Information Systems
Biometrics
Soggetto genere / forma Kalkutta (2009)
Kongress.
ISBN 3-642-10772-9
Classificazione DAT 460f
DAT 461f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Talks -- A Survey of Voice over IP Security Research -- Security for a Smarter Planet -- The WOMBAT Attack Attribution Method: Some Results -- Biometrics and Security -- Authentication -- Remote Electronic Voting with Revocable Anonymity -- On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals -- On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup -- Verification -- Biometric Identification over Encrypted Data Made Feasible -- Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity -- Formal Verification of Security Policy Implementations in Enterprise Networks -- Systems Security -- Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles -- An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products -- DROP: Detecting Return-Oriented Programming Malicious Code -- Behavior Analysis -- A Framework for Behavior-Based Malware Analysis in the Cloud -- BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs -- Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders -- Database Security -- Database Relation Watermarking Resilient against Secondary Watermarking Attacks -- A Robust Damage Assessment Model for Corrupted Database Systems -- A Generic Distortion Free Watermarking Technique for Relational Databases -- Cryptography -- On Some Weaknesses in the Disk Encryption Schemes EME and EME2 -- TWIS – A Lightweight Block Cipher -- Short Papers -- Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking -- Method-Specific Java Access Control via RMI Proxy Objects Using Annotations -- Let Only the Right One IN: Privacy Management Scheme for Social Network -- Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper).
Record Nr. UNISA-996466310903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Systems Security [[electronic resource] ] : 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings / / edited by Atul Prakash
Information Systems Security [[electronic resource] ] : 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings / / edited by Atul Prakash
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XV, 327 p.)
Disciplina 004n/a
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Computer security
Information storage and retrieval
Management information systems
Computer science
Biometrics (Biology)
Computer Communication Networks
Cryptology
Systems and Data Security
Information Storage and Retrieval
Management of Computing and Information Systems
Biometrics
Soggetto genere / forma Kalkutta (2009)
Kongress.
ISBN 3-642-10772-9
Classificazione DAT 460f
DAT 461f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Talks -- A Survey of Voice over IP Security Research -- Security for a Smarter Planet -- The WOMBAT Attack Attribution Method: Some Results -- Biometrics and Security -- Authentication -- Remote Electronic Voting with Revocable Anonymity -- On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals -- On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup -- Verification -- Biometric Identification over Encrypted Data Made Feasible -- Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity -- Formal Verification of Security Policy Implementations in Enterprise Networks -- Systems Security -- Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles -- An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products -- DROP: Detecting Return-Oriented Programming Malicious Code -- Behavior Analysis -- A Framework for Behavior-Based Malware Analysis in the Cloud -- BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs -- Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders -- Database Security -- Database Relation Watermarking Resilient against Secondary Watermarking Attacks -- A Robust Damage Assessment Model for Corrupted Database Systems -- A Generic Distortion Free Watermarking Technique for Relational Databases -- Cryptography -- On Some Weaknesses in the Disk Encryption Schemes EME and EME2 -- TWIS – A Lightweight Block Cipher -- Short Papers -- Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking -- Method-Specific Java Access Control via RMI Proxy Objects Using Annotations -- Let Only the Right One IN: Privacy Management Scheme for Social Network -- Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper).
Record Nr. UNINA-9910483314703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui