Buch, Englisch, 326 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 517 g
Reihe: Security and Cryptology
Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings
Buch, Englisch, 326 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 517 g
Reihe: Security and Cryptology
ISBN: 978-3-540-77085-5
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Datenkompression, Dokumentaustauschformate
Weitere Infos & Material
Keynote Address.- Security in Practice – Security-Usability Chasm.- Network Security.- Investigating the Impact of Real-World Factors on Internet Worm Propagation.- An OS Security Protection Model for Defeating Attacks from Network.- A Secure Intra-domain Routing Protocol for Wireless Mesh Networks.- Cryptography.- Genetic Algorithm Based Steganography Using Wavelets.- Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol.- A Near Optimal S-Box Design.- Architectures and Systems.- A Software Framework for Autonomic Security in Pervasive Environments.- DLPKH – Distributed Logical Public-Key Hierarchy.- Inference Control in Logic Databases as a Constraint Satisfaction Problem.- Cryptanalysis.- An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm.- Cryptanalysis and the Improvement of Kim et al.’s Password Authentication Schemes.- Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures.- Keynote Talk.- Data Privacy – Problems and Solutions.- Protocols.- Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals.- A Secure and Efficient Multi-authority Proactive Election Scheme.- Secure Transaction Management Protocols for MLS/DDBMS.- Keynote Talk.- The Curse of Ease of Access to the Internet.- Short Papers.- A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document.- A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks.- Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks.- A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation.- On Knowledge-Based Classification of Abnormal BGP Events.- Towards Automated PrivilegeSeparation.- Detection and Recognition.- Constructing a “Common Cross Site Scripting Vulnerabilities Enumeration (CXE)” Using CWE and CVE.- Performance Analysis for Multi Sensor Fingerprint Recognition System.- Use of Dimensionality Reduction for Intrusion Detection.