Description |
1 online resource (xv, 404 pages) : illustrations (some color) |
Series |
Lecture Notes in Computer Science ; 8303 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 8303.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Challenges and Opportunities for Security with Differential Privacy / Chris Clifton and Balamurugan Anandan -- An Encrypted In-Memory Column-Store: The Onion Selection Problem / Florian Kerschbaum, Martin Härterich, Mathias Kohler [and others] -- Risk Aware Approach to Data Confidentiality in Cloud Computing / Kerim Yasin Oktay, Vaibhav Khadilkar, Murat Kantarcioglu and Sharad Mehrotra -- Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach / Samiran Bag, Sushmita Ruj and Bimal Roy -- Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card / Ankita Chaturvedi, Dheerendra Mishra and Sourav Mukhopadhyay -- Signcryption from Randomness Recoverable PKE Revisited / Angsuman Das and Avishek Adhikari -- Auctions with Rational Adversary / Sourya Joyee De and Asim K. Pal |
|
A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services / Koen Decroix, Jorn Lapon, Bart De Decker and Vincent Naessens -- Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach / Ganugula Umadevi and Ashutosh Saxena -- Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management / Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia [and others] -- Secure States versus Secure Executions / Mathieu Jaume, Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong and Ludovic Mé -- Monitoring for Slow Suspicious Activities Using a Target Centric Approach / Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou and Anne E. James -- RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers / Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay and Goutam Paul |
|
Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme / Naveen Kumar, Anish Mathuria and Manik Lal Das -- Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing / Sheethal Kumar, Pai B.J. Jaipal, Sourav Sen Gupta and Vigesh R. Ungrapalli -- Web Services Based Attacks against Image CAPTCHAs / David Lorenzi, Jaideep Vaidya, Shamik Sural and Vijayalakshmi Atluri -- New Long-Term Glimpse of RC4 Stream Cipher / Subhamoy Maitra and Sourav Sen Gupta -- A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs / Soumyadev Maity and R.C. Hansdah -- Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols / Dheerendra Mishra and Sourav Mukhopadhyay -- Information Theoretical Analysis of Side-Channel Attack / Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka and Takakazu Kurokawa -- Efficient Multi-bit Image Steganography in Spatial Domain / Imon Mukherjee and Goutam Paul |
|
Evolutionary Multibit Grouping Steganographic Algorithm / Nabanita Mukherjee, Ayon Bhattacharya and Siddhartha Sekhar Bose -- Let the Right One in: Discovering and Mitigating Permission Gaps / Beng Heng Ng and Atul Prakash -- A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET / R.V. Pradweap and R.C. Hansdah -- Recipient Anonymous Ciphertext-Policy Attribute Based Encryption / Y. Sreenivasa Rao and Ratna Dutta -- Error Correction of Partially Exposed RSA Private Keys from MSB Side / Santanu Sarkar, Sourav Sen Gupta and Subhamoy Maitra -- Efficient Enforcement of Privacy for Moving Object Trajectories / Anuj Shanker Saxena, Vikram Goyal and Debajyoti Bera -- An Administrative Model for Spatio-Temporal Role Based Access Control / Manisha Sharma, Shamik Sural, Vijayalakshmi Atluri and Jaideep Vaidya -- A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm / Yasser Sobhdel and Rasool Jalili |
Summary |
This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical problems in information and systems security and related areas |
Notes |
International conference proceedings |
Bibliography |
Includes bibliographical references and author index |
Notes |
Print version record |
Subject |
Computer security -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Data protection -- Congresses
|
|
Computer security.
|
|
Computer networks.
|
|
Computer Security
|
|
Computer Communication Networks
|
|
Computer networks
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Data encryption (Computer science)
|
|
Data protection
|
|
Engineering & Applied Sciences.
|
|
Computer Science.
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Bagchi, Aditya, editor
|
|
Ray, Indrakshi, editor
|
ISBN |
9783642452048 |
|
3642452043 |
|
3642452035 |
|
9783642452031 |
|