Information systems security : 9th international conference, ICISS 2013, Kolkata, India, December 16-20, 2013, proceedings /

Saved in:
Bibliographic Details
Meeting name:ICISS (Conference) (9th : 2013 : Kolkata, India)
Imprint:Berlin : Springer, [2013]
Description:1 online resource (xv, 404 pages) : illustrations (some color).
Language:English
Series:Lecture Notes in Computer Science ; 8303
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 8303.
LNCS sublibrary. SL 4, Security and cryptology.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11082331
Hidden Bibliographic Details
Varying Form of Title:ICISS 2013
Other authors / contributors:Bagchi, Aditya, editor.
Ray, Indrakshi, editor.
ISBN:9783642452048
3642452043
3642452035
9783642452031
9783642452031
Notes:International conference proceedings.
Includes bibliographical references and author index.
Print version record.
Summary:This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical problems in information and systems security and related areas.
Other form:Print version: Information Systems Security 3642452035
Standard no.:10.1007/978-3-642-45204-8

MARC

LEADER 00000cam a2200000Ii 4500
001 11082331
005 20170630045042.2
006 m o d
007 cr cnu---unuuu
008 131224s2013 gw a ob 101 0 eng d
003 ICU
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d YDXCP  |d NAM  |d OHS  |d ZMC  |d COO  |d UKMGB  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCO  |d EBLCP  |d OCLCQ  |d OCLCO  |d DIBIB  |d OCLCO  |d YDX  |d DGU 
016 7 |a 016586554  |2 Uk 
020 |a 9783642452048  |q (electronic bk.) 
020 |a 3642452043  |q (electronic bk.) 
020 |a 3642452035  |q (print) 
020 |a 9783642452031  |q (print) 
020 |z 9783642452031 
024 7 |a 10.1007/978-3-642-45204-8  |2 doi 
035 |a (OCoLC)866639332 
050 4 |a QA76.9.A25  |b I25 2013 
060 4 |a QA76.9.A25 
049 |a MAIN 
111 2 |a ICISS (Conference)  |n (9th :  |d 2013 :  |c Kolkata, India)  |0 http://id.loc.gov/authorities/names/nb2013027774  |1 http://viaf.org/viaf/305941057 
245 1 0 |a Information systems security :  |b 9th international conference, ICISS 2013, Kolkata, India, December 16-20, 2013, proceedings /  |c Aditya Bagchi, Indrakshi Ray (eds.). 
246 3 0 |a ICISS 2013 
264 1 |a Berlin :  |b Springer,  |c [2013] 
300 |a 1 online resource (xv, 404 pages) :  |b illustrations (some color). 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
490 1 |a Lecture Notes in Computer Science ;  |v 8303 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology 
500 |a International conference proceedings. 
505 0 0 |t Challenges and Opportunities for Security with Differential Privacy /  |r Chris Clifton and Balamurugan Anandan --  |t An Encrypted In-Memory Column-Store: The Onion Selection Problem /  |r Florian Kerschbaum, Martin Härterich, Mathias Kohler [and others] --  |t Risk Aware Approach to Data Confidentiality in Cloud Computing /  |r Kerim Yasin Oktay, Vaibhav Khadilkar, Murat Kantarcioglu and Sharad Mehrotra --  |t Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach /  |r Samiran Bag, Sushmita Ruj and Bimal Roy --  |t Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card /  |r Ankita Chaturvedi, Dheerendra Mishra and Sourav Mukhopadhyay --  |t Signcryption from Randomness Recoverable PKE Revisited /  |r Angsuman Das and Avishek Adhikari --  |t Auctions with Rational Adversary /  |r Sourya Joyee De and Asim K. Pal. 
505 8 0 |t A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services /  |r Koen Decroix, Jorn Lapon, Bart De Decker and Vincent Naessens --  |t Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach /  |r Ganugula Umadevi and Ashutosh Saxena --  |t Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management /  |r Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia [and others] --  |t Secure States versus Secure Executions /  |r Mathieu Jaume, Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong and Ludovic Mé --  |t Monitoring for Slow Suspicious Activities Using a Target Centric Approach /  |r Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou and Anne E. James --  |t RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers /  |r Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay and Goutam Paul. 
505 8 0 |t Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme /  |r Naveen Kumar, Anish Mathuria and Manik Lal Das --  |t Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing /  |r Sheethal Kumar, Pai B.J. Jaipal, Sourav Sen Gupta and Vigesh R. Ungrapalli --  |t Web Services Based Attacks against Image CAPTCHAs /  |r David Lorenzi, Jaideep Vaidya, Shamik Sural and Vijayalakshmi Atluri --  |t New Long-Term Glimpse of RC4 Stream Cipher /  |r Subhamoy Maitra and Sourav Sen Gupta --  |t A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs /  |r Soumyadev Maity and R.C. Hansdah --  |t Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols /  |r Dheerendra Mishra and Sourav Mukhopadhyay --  |t Information Theoretical Analysis of Side-Channel Attack /  |r Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka and Takakazu Kurokawa --  |t Efficient Multi-bit Image Steganography in Spatial Domain /  |r Imon Mukherjee and Goutam Paul. 
505 8 0 |t Evolutionary Multibit Grouping Steganographic Algorithm /  |r Nabanita Mukherjee, Ayon Bhattacharya and Siddhartha Sekhar Bose --  |t Let the Right One in: Discovering and Mitigating Permission Gaps /  |r Beng Heng Ng and Atul Prakash --  |t A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET /  |r R.V. Pradweap and R.C. Hansdah --  |t Recipient Anonymous Ciphertext-Policy Attribute Based Encryption /  |r Y. Sreenivasa Rao and Ratna Dutta --  |t Error Correction of Partially Exposed RSA Private Keys from MSB Side /  |r Santanu Sarkar, Sourav Sen Gupta and Subhamoy Maitra --  |t Efficient Enforcement of Privacy for Moving Object Trajectories /  |r Anuj Shanker Saxena, Vikram Goyal and Debajyoti Bera --  |t An Administrative Model for Spatio-Temporal Role Based Access Control /  |r Manisha Sharma, Shamik Sural, Vijayalakshmi Atluri and Jaideep Vaidya --  |t A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm /  |r Yasser Sobhdel and Rasool Jalili. 
504 |a Includes bibliographical references and author index. 
520 |a This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical problems in information and systems security and related areas. 
588 0 |a Print version record. 
650 0 |a Computer security  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101458 
650 0 |a Computer networks  |x Security measures  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101490 
650 0 |a Data encryption (Computer science)  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102033 
650 0 |a Data protection  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102034 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 2 |a Computer Security. 
650 2 |a Computer Communication Networks. 
655 4 |a Electronic books. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772 
655 7 |a Ebook.  |2 local 
655 2 |a Congresses. 
700 1 |a Bagchi, Aditya,  |e editor.  |0 http://id.loc.gov/authorities/names/nb2007000334  |1 http://viaf.org/viaf/77484326 
700 1 |a Ray, Indrakshi,  |e editor.  |0 http://id.loc.gov/authorities/names/n2004004727  |1 http://viaf.org/viaf/31382700 
776 0 8 |i Print version:  |t Information Systems Security  |z 3642452035  |w (OCoLC)864390869 
830 0 |a Lecture notes in computer science ;  |v 8303. 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology. 
856 4 0 |u http://link.springer.com/10.1007/978-3-642-45204-8  |y SpringerLink 
903 |a HeVa 
929 |a eresource 
999 f f |i 4af60a43-fab6-50c0-9337-e21a08d2d20b  |s 2a8e1f4b-0f95-5ec4-8d9c-0ba337fb4ebb 
928 |t Library of Congress classification  |a QA76.9.A25 I25 2013  |l Online  |c UC-FullText  |u http://link.springer.com/10.1007/978-3-642-45204-8  |z SpringerLink  |g ebooks  |i 9892565