Information systems security : 9th international conference, ICISS 2013, Kolkata, India, December 16-20, 2013, proceedings /
Saved in:
Meeting name: | ICISS (Conference) (9th : 2013 : Kolkata, India) |
---|---|
Imprint: | Berlin : Springer, [2013] |
Description: | 1 online resource (xv, 404 pages) : illustrations (some color). |
Language: | English |
Series: | Lecture Notes in Computer Science ; 8303 LNCS sublibrary. SL 4, Security and cryptology Lecture notes in computer science ; 8303. LNCS sublibrary. SL 4, Security and cryptology. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11082331 |
MARC
LEADER | 00000cam a2200000Ii 4500 | ||
---|---|---|---|
001 | 11082331 | ||
005 | 20170630045042.2 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 131224s2013 gw a ob 101 0 eng d | ||
003 | ICU | ||
040 | |a GW5XE |b eng |e rda |e pn |c GW5XE |d YDXCP |d NAM |d OHS |d ZMC |d COO |d UKMGB |d OCLCO |d OCLCF |d OCLCQ |d OCLCO |d OCL |d OCLCO |d EBLCP |d OCLCQ |d OCLCO |d DIBIB |d OCLCO |d YDX |d DGU | ||
016 | 7 | |a 016586554 |2 Uk | |
020 | |a 9783642452048 |q (electronic bk.) | ||
020 | |a 3642452043 |q (electronic bk.) | ||
020 | |a 3642452035 |q (print) | ||
020 | |a 9783642452031 |q (print) | ||
020 | |z 9783642452031 | ||
024 | 7 | |a 10.1007/978-3-642-45204-8 |2 doi | |
035 | |a (OCoLC)866639332 | ||
050 | 4 | |a QA76.9.A25 |b I25 2013 | |
060 | 4 | |a QA76.9.A25 | |
049 | |a MAIN | ||
111 | 2 | |a ICISS (Conference) |n (9th : |d 2013 : |c Kolkata, India) |0 http://id.loc.gov/authorities/names/nb2013027774 |1 http://viaf.org/viaf/305941057 | |
245 | 1 | 0 | |a Information systems security : |b 9th international conference, ICISS 2013, Kolkata, India, December 16-20, 2013, proceedings / |c Aditya Bagchi, Indrakshi Ray (eds.). |
246 | 3 | 0 | |a ICISS 2013 |
264 | 1 | |a Berlin : |b Springer, |c [2013] | |
300 | |a 1 online resource (xv, 404 pages) : |b illustrations (some color). | ||
336 | |a text |b txt |2 rdacontent |0 http://id.loc.gov/vocabulary/contentTypes/txt | ||
337 | |a computer |b c |2 rdamedia |0 http://id.loc.gov/vocabulary/mediaTypes/c | ||
338 | |a online resource |b cr |2 rdacarrier |0 http://id.loc.gov/vocabulary/carriers/cr | ||
490 | 1 | |a Lecture Notes in Computer Science ; |v 8303 | |
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology | |
500 | |a International conference proceedings. | ||
505 | 0 | 0 | |t Challenges and Opportunities for Security with Differential Privacy / |r Chris Clifton and Balamurugan Anandan -- |t An Encrypted In-Memory Column-Store: The Onion Selection Problem / |r Florian Kerschbaum, Martin Härterich, Mathias Kohler [and others] -- |t Risk Aware Approach to Data Confidentiality in Cloud Computing / |r Kerim Yasin Oktay, Vaibhav Khadilkar, Murat Kantarcioglu and Sharad Mehrotra -- |t Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach / |r Samiran Bag, Sushmita Ruj and Bimal Roy -- |t Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card / |r Ankita Chaturvedi, Dheerendra Mishra and Sourav Mukhopadhyay -- |t Signcryption from Randomness Recoverable PKE Revisited / |r Angsuman Das and Avishek Adhikari -- |t Auctions with Rational Adversary / |r Sourya Joyee De and Asim K. Pal. |
505 | 8 | 0 | |t A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services / |r Koen Decroix, Jorn Lapon, Bart De Decker and Vincent Naessens -- |t Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach / |r Ganugula Umadevi and Ashutosh Saxena -- |t Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management / |r Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia [and others] -- |t Secure States versus Secure Executions / |r Mathieu Jaume, Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong and Ludovic Mé -- |t Monitoring for Slow Suspicious Activities Using a Target Centric Approach / |r Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou and Anne E. James -- |t RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers / |r Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay and Goutam Paul. |
505 | 8 | 0 | |t Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme / |r Naveen Kumar, Anish Mathuria and Manik Lal Das -- |t Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing / |r Sheethal Kumar, Pai B.J. Jaipal, Sourav Sen Gupta and Vigesh R. Ungrapalli -- |t Web Services Based Attacks against Image CAPTCHAs / |r David Lorenzi, Jaideep Vaidya, Shamik Sural and Vijayalakshmi Atluri -- |t New Long-Term Glimpse of RC4 Stream Cipher / |r Subhamoy Maitra and Sourav Sen Gupta -- |t A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs / |r Soumyadev Maity and R.C. Hansdah -- |t Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols / |r Dheerendra Mishra and Sourav Mukhopadhyay -- |t Information Theoretical Analysis of Side-Channel Attack / |r Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka and Takakazu Kurokawa -- |t Efficient Multi-bit Image Steganography in Spatial Domain / |r Imon Mukherjee and Goutam Paul. |
505 | 8 | 0 | |t Evolutionary Multibit Grouping Steganographic Algorithm / |r Nabanita Mukherjee, Ayon Bhattacharya and Siddhartha Sekhar Bose -- |t Let the Right One in: Discovering and Mitigating Permission Gaps / |r Beng Heng Ng and Atul Prakash -- |t A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET / |r R.V. Pradweap and R.C. Hansdah -- |t Recipient Anonymous Ciphertext-Policy Attribute Based Encryption / |r Y. Sreenivasa Rao and Ratna Dutta -- |t Error Correction of Partially Exposed RSA Private Keys from MSB Side / |r Santanu Sarkar, Sourav Sen Gupta and Subhamoy Maitra -- |t Efficient Enforcement of Privacy for Moving Object Trajectories / |r Anuj Shanker Saxena, Vikram Goyal and Debajyoti Bera -- |t An Administrative Model for Spatio-Temporal Role Based Access Control / |r Manisha Sharma, Shamik Sural, Vijayalakshmi Atluri and Jaideep Vaidya -- |t A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm / |r Yasser Sobhdel and Rasool Jalili. |
504 | |a Includes bibliographical references and author index. | ||
520 | |a This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical problems in information and systems security and related areas. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer security |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101458 | |
650 | 0 | |a Computer networks |x Security measures |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101490 | |
650 | 0 | |a Data encryption (Computer science) |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008102033 | |
650 | 0 | |a Data protection |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008102034 | |
650 | 7 | |a Computer networks |x Security measures. |2 fast |0 (OCoLC)fst00872341 | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484 | |
650 | 7 | |a Data encryption (Computer science) |2 fast |0 (OCoLC)fst00887935 | |
650 | 7 | |a Data protection. |2 fast |0 (OCoLC)fst00887958 | |
650 | 2 | |a Computer Security. | |
650 | 2 | |a Computer Communication Networks. | |
655 | 4 | |a Electronic books. | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 (OCoLC)fst01423772 | |
655 | 7 | |a Ebook. |2 local | |
655 | 2 | |a Congresses. | |
700 | 1 | |a Bagchi, Aditya, |e editor. |0 http://id.loc.gov/authorities/names/nb2007000334 |1 http://viaf.org/viaf/77484326 | |
700 | 1 | |a Ray, Indrakshi, |e editor. |0 http://id.loc.gov/authorities/names/n2004004727 |1 http://viaf.org/viaf/31382700 | |
776 | 0 | 8 | |i Print version: |t Information Systems Security |z 3642452035 |w (OCoLC)864390869 |
830 | 0 | |a Lecture notes in computer science ; |v 8303. | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. | |
856 | 4 | 0 | |u http://link.springer.com/10.1007/978-3-642-45204-8 |y SpringerLink |
903 | |a HeVa | ||
929 | |a eresource | ||
999 | f | f | |i 4af60a43-fab6-50c0-9337-e21a08d2d20b |s 2a8e1f4b-0f95-5ec4-8d9c-0ba337fb4ebb |
928 | |t Library of Congress classification |a QA76.9.A25 I25 2013 |l Online |c UC-FullText |u http://link.springer.com/10.1007/978-3-642-45204-8 |z SpringerLink |g ebooks |i 9892565 |