Information Systems Security (eBook, PDF)
5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings
Redaktion: Prakash, Atul
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Information Systems Security (eBook, PDF)
5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings
Redaktion: Prakash, Atul
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 5th International Conference on Information Systems Security, ICISS 2009, held in Kolkata, India, in December 2009.
The 17 revised full papers and 4 short papers, presented together with 4 keynote talks were carefully reviewed and selected from 85 initial submissions. The papers are organized in topical sections on authentication, verification, systems security, behavior analysis, database security, and cryptography.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 5.64MB
Andere Kunden interessierten sich auch für
- Formal Aspects in Security and Trust (eBook, PDF)40,95 €
- Computer Security - ESORICS 2010 (eBook, PDF)73,95 €
- Secure Data Management (eBook, PDF)40,95 €
- iNetSec 2009 - Open Research Problems in Network Security (eBook, PDF)40,95 €
- Public Key Infrastructure (eBook, PDF)40,95 €
- Resilient Networks and Services (eBook, PDF)57,95 €
- Applied Cryptography and Network Security (eBook, PDF)73,95 €
-
-
-
This book constitutes the refereed proceedings of the 5th International Conference on Information Systems Security, ICISS 2009, held in Kolkata, India, in December 2009.
The 17 revised full papers and 4 short papers, presented together with 4 keynote talks were carefully reviewed and selected from 85 initial submissions. The papers are organized in topical sections on authentication, verification, systems security, behavior analysis, database security, and cryptography.
The 17 revised full papers and 4 short papers, presented together with 4 keynote talks were carefully reviewed and selected from 85 initial submissions. The papers are organized in topical sections on authentication, verification, systems security, behavior analysis, database security, and cryptography.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 327
- Erscheinungstermin: 16. November 2009
- Englisch
- ISBN-13: 9783642107726
- Artikelnr.: 44127615
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 327
- Erscheinungstermin: 16. November 2009
- Englisch
- ISBN-13: 9783642107726
- Artikelnr.: 44127615
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Keynote Talks.- A Survey of Voice over IP Security Research.- Security for a Smarter Planet.- The WOMBAT Attack Attribution Method: Some Results.- Biometrics and Security.- Authentication.- Remote Electronic Voting with Revocable Anonymity.- On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals.- On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.- Verification.- Biometric Identification over Encrypted Data Made Feasible.- Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity.- Formal Verification of Security Policy Implementations in Enterprise Networks.- Systems Security.- Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles.- An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products.- DROP: Detecting Return-Oriented Programming Malicious Code.- Behavior Analysis.- A Framework for Behavior-Based Malware Analysis in the Cloud.- BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs.- Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders.- Database Security.- Database Relation Watermarking Resilient against Secondary Watermarking Attacks.- A Robust Damage Assessment Model for Corrupted Database Systems.- A Generic Distortion Free Watermarking Technique for Relational Databases.- Cryptography.- On Some Weaknesses in the Disk Encryption Schemes EME and EME2.- TWIS - A Lightweight Block Cipher.- Short Papers.- Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking.- Method-Specific Java Access Control via RMI Proxy Objects Using Annotations.- Let Only the Right One IN:Privacy Management Scheme for Social Network.- Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper).
Keynote Talks.- A Survey of Voice over IP Security Research.- Security for a Smarter Planet.- The WOMBAT Attack Attribution Method: Some Results.- Biometrics and Security.- Authentication.- Remote Electronic Voting with Revocable Anonymity.- On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals.- On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.- Verification.- Biometric Identification over Encrypted Data Made Feasible.- Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity.- Formal Verification of Security Policy Implementations in Enterprise Networks.- Systems Security.- Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles.- An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products.- DROP: Detecting Return-Oriented Programming Malicious Code.- Behavior Analysis.- A Framework for Behavior-Based Malware Analysis in the Cloud.- BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs.- Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders.- Database Security.- Database Relation Watermarking Resilient against Secondary Watermarking Attacks.- A Robust Damage Assessment Model for Corrupted Database Systems.- A Generic Distortion Free Watermarking Technique for Relational Databases.- Cryptography.- On Some Weaknesses in the Disk Encryption Schemes EME and EME2.- TWIS - A Lightweight Block Cipher.- Short Papers.- Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking.- Method-Specific Java Access Control via RMI Proxy Objects Using Annotations.- Let Only the Right One IN:Privacy Management Scheme for Social Network.- Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper).