Information Systems Security: Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 4812

ISBN: 3540770852, 9783540770855

Size: 4 MB (3775557 bytes)

Pages: 326/333

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Atul Prakash (auth.), Patrick McDaniel, Shyam K. Gupta (eds.)3540770852, 9783540770855


Table of contents :
Front Matter….Pages –
Security in Practice – Security-Usability Chasm….Pages 1-9
Investigating the Impact of Real-World Factors on Internet Worm Propagation….Pages 10-24
An OS Security Protection Model for Defeating Attacks from Network….Pages 25-36
A Secure Intra-domain Routing Protocol for Wireless Mesh Networks….Pages 37-50
Genetic Algorithm Based Steganography Using Wavelets….Pages 51-63
Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol….Pages 64-76
A Near Optimal S-Box Design….Pages 77-90
A Software Framework for Autonomic Security in Pervasive Environments….Pages 91-109
DLPKH – Distributed Logical Public-Key Hierarchy….Pages 110-127
Inference Control in Logic Databases as a Constraint Satisfaction Problem….Pages 128-142
An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm….Pages 143-155
Cryptanalysis and the Improvement of Kim et al.’s Password Authentication Schemes….Pages 156-166
Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures….Pages 167-179
Data Privacy – Problems and Solutions….Pages 180-192
Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals….Pages 193-207
A Secure and Efficient Multi-authority Proactive Election Scheme….Pages 208-218
Secure Transaction Management Protocols for MLS/DDBMS….Pages 219-233
The Curse of Ease of Access to the Internet….Pages 234-249
A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document….Pages 250-253
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks….Pages 254-258
Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks….Pages 259-262
A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation….Pages 263-266
On Knowledge-Based Classification of Abnormal BGP Events….Pages 267-271
Towards Automated Privilege Separation….Pages 272-276
Constructing a “Common Cross Site Scripting Vulnerabilities Enumeration (CXE)” Using CWE and CVE….Pages 277-291
Performance Analysis for Multi Sensor Fingerprint Recognition System….Pages 292-305
Use of Dimensionality Reduction for Intrusion Detection….Pages 306-320
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Information Systems Security: Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings”
Shopping Cart
Scroll to Top