Limit search to available items
Book Cover
E-book
Author ICISS (Conference) (9th : 2013 : Kolkata, India)

Title Information systems security : 9th international conference, ICISS 2013, Kolkata, India, December 16-20, 2013, proceedings / Aditya Bagchi, Indrakshi Ray (eds.)
Published Berlin : Springer, [2013]

Copies

Description 1 online resource (xv, 404 pages) : illustrations (some color)
Series Lecture Notes in Computer Science ; 8303
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 8303.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Challenges and Opportunities for Security with Differential Privacy / Chris Clifton and Balamurugan Anandan -- An Encrypted In-Memory Column-Store: The Onion Selection Problem / Florian Kerschbaum, Martin Härterich, Mathias Kohler [and others] -- Risk Aware Approach to Data Confidentiality in Cloud Computing / Kerim Yasin Oktay, Vaibhav Khadilkar, Murat Kantarcioglu and Sharad Mehrotra -- Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach / Samiran Bag, Sushmita Ruj and Bimal Roy -- Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card / Ankita Chaturvedi, Dheerendra Mishra and Sourav Mukhopadhyay -- Signcryption from Randomness Recoverable PKE Revisited / Angsuman Das and Avishek Adhikari -- Auctions with Rational Adversary / Sourya Joyee De and Asim K. Pal
A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services / Koen Decroix, Jorn Lapon, Bart De Decker and Vincent Naessens -- Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach / Ganugula Umadevi and Ashutosh Saxena -- Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management / Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia [and others] -- Secure States versus Secure Executions / Mathieu Jaume, Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong and Ludovic Mé -- Monitoring for Slow Suspicious Activities Using a Target Centric Approach / Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou and Anne E. James -- RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers / Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay and Goutam Paul
Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme / Naveen Kumar, Anish Mathuria and Manik Lal Das -- Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing / Sheethal Kumar, Pai B.J. Jaipal, Sourav Sen Gupta and Vigesh R. Ungrapalli -- Web Services Based Attacks against Image CAPTCHAs / David Lorenzi, Jaideep Vaidya, Shamik Sural and Vijayalakshmi Atluri -- New Long-Term Glimpse of RC4 Stream Cipher / Subhamoy Maitra and Sourav Sen Gupta -- A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs / Soumyadev Maity and R.C. Hansdah -- Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols / Dheerendra Mishra and Sourav Mukhopadhyay -- Information Theoretical Analysis of Side-Channel Attack / Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka and Takakazu Kurokawa -- Efficient Multi-bit Image Steganography in Spatial Domain / Imon Mukherjee and Goutam Paul
Evolutionary Multibit Grouping Steganographic Algorithm / Nabanita Mukherjee, Ayon Bhattacharya and Siddhartha Sekhar Bose -- Let the Right One in: Discovering and Mitigating Permission Gaps / Beng Heng Ng and Atul Prakash -- A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET / R.V. Pradweap and R.C. Hansdah -- Recipient Anonymous Ciphertext-Policy Attribute Based Encryption / Y. Sreenivasa Rao and Ratna Dutta -- Error Correction of Partially Exposed RSA Private Keys from MSB Side / Santanu Sarkar, Sourav Sen Gupta and Subhamoy Maitra -- Efficient Enforcement of Privacy for Moving Object Trajectories / Anuj Shanker Saxena, Vikram Goyal and Debajyoti Bera -- An Administrative Model for Spatio-Temporal Role Based Access Control / Manisha Sharma, Shamik Sural, Vijayalakshmi Atluri and Jaideep Vaidya -- A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm / Yasser Sobhdel and Rasool Jalili
Summary This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical problems in information and systems security and related areas
Notes International conference proceedings
Bibliography Includes bibliographical references and author index
Notes Print version record
Subject Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Data encryption (Computer science) -- Congresses
Data protection -- Congresses
Computer security.
Computer networks.
Computer Security
Computer Communication Networks
Computer networks
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Data protection
Engineering & Applied Sciences.
Computer Science.
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Bagchi, Aditya, editor
Ray, Indrakshi, editor
ISBN 9783642452048
3642452043
3642452035
9783642452031
Other Titles ICISS 2013