000 04481nam a22006495i 4500
001 978-3-540-77086-2
003 DE-He213
005 20240423125850.0
007 cr nn 008mamaa
008 100301s2007 gw | s |||| 0|eng d
020 _a9783540770862
_9978-3-540-77086-2
024 7 _a10.1007/978-3-540-77086-2
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aInformation Systems Security
_h[electronic resource] :
_bThird International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings /
_cedited by Patrick McDaniel, Shyam K. Gupta.
250 _a1st ed. 2007.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2007.
300 _aXIII, 326 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v4812
505 0 _aKeynote Address -- Security in Practice – Security-Usability Chasm -- Network Security -- Investigating the Impact of Real-World Factors on Internet Worm Propagation -- An OS Security Protection Model for Defeating Attacks from Network -- A Secure Intra-domain Routing Protocol for Wireless Mesh Networks -- Cryptography -- Genetic Algorithm Based Steganography Using Wavelets -- Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol -- A Near Optimal S-Box Design -- Architectures and Systems -- A Software Framework for Autonomic Security in Pervasive Environments -- DLPKH – Distributed Logical Public-Key Hierarchy -- Inference Control in Logic Databases as a Constraint Satisfaction Problem -- Cryptanalysis -- An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm -- Cryptanalysis and the Improvement of Kim et al.’s Password Authentication Schemes -- Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures -- Keynote Talk -- Data Privacy – Problems and Solutions -- Protocols -- Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals -- A Secure and Efficient Multi-authority Proactive Election Scheme -- Secure Transaction Management Protocols for MLS/DDBMS -- Keynote Talk -- The Curse of Ease of Access to the Internet -- Short Papers -- A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document -- A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks -- Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks -- A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation -- On Knowledge-Based Classification of Abnormal BGP Events -- Towards Automated PrivilegeSeparation -- Detection and Recognition -- Constructing a “Common Cross Site Scripting Vulnerabilities Enumeration (CXE)” Using CWE and CVE -- Performance Analysis for Multi Sensor Fingerprint Recognition System -- Use of Dimensionality Reduction for Intrusion Detection.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aComputer networks .
650 0 _aData protection.
650 0 _aComputers and civilization.
650 0 _aElectronic data processing
_xManagement.
650 0 _aInformation storage and retrieval systems.
650 1 4 _aCryptology.
650 2 4 _aComputer Communication Networks.
650 2 4 _aData and Information Security.
650 2 4 _aComputers and Society.
650 2 4 _aIT Operations.
650 2 4 _aInformation Storage and Retrieval.
700 1 _aMcDaniel, Patrick.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aGupta, Shyam K.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540770855
776 0 8 _iPrinted edition:
_z9783540846420
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v4812
856 4 0 _uhttps://doi.org/10.1007/978-3-540-77086-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c182514
_d182514