9783540770855

Information Systems Security

by ;
  • ISBN13:

    9783540770855

  • ISBN10:

    3540770852

  • Format: Paperback
  • Copyright: 2008-01-16
  • Publisher: Springer-Verlag New York Inc

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $84.99 Save up to $21.25
  • Buy Used
    $63.74
    Add to Cart Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS 2007, held in Delhi, India, in December 2007. The 18 revised full papers and five short papers presented together with four keynote papers were carefully reviewed and selected. The papers are organized in topical sections on network security, cryptography, architectures and systems, cryptanalysis, protocols, detection and recognition, as well as short papers.

Table of Contents

Keynote Address
Security in Practice - Security-Usability Chasmp. 1
Network Security
Investigating the Impact of Real-World Factors on Internet Worm Propagationp. 10
An OS Security Protection Model for Defeating Attacks from Networkp. 25
A Secure Intra-domain Routing Protocol for Wireless Mesh Networksp. 37
Cryptography
Genetic Algorithm Based Steganography Using Waveletsp. 51
Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocolp. 64
A Near Optimal S-Box Designp. 77
Architectures and Systems
A Software Framework for Autonomic Security in Pervasive Environmentsp. 91
DLPKH - Distributed Logical Public-Key Hierarchyp. 110
Inference Control in Logic Databases as a Constraint Satisfaction Problemp. 128
Cryptanalysis
An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithmp. 143
Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemesp. 156
Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasuresp. 167
Keynote Talk
Data Privacy - Problems and Solutionsp. 180
Protocols
Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signalsp. 193
A Secure and Efficient Multi-authority Proactive Election Schemep. 208
Secure Transaction Management Protocols for MLS/DDBMSp. 219
Keynote Talk
The Curse of Ease of Access to the Internetp. 234
Short Papers
A Structured Approach to Detect Scanner-Printer Used in Generating Fake Documentp. 250
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacksp. 254
Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacksp. 259
A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimationp. 263
On Knowledge-Based Classification of Abnormal BGP Eventsp. 267
Towards Automated Privilege Separationp. 272
Detection and Recognition
Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration (CXE)" Using CWE and CVEp. 277
Performance Analysis for Multi Sensor Fingerprint Recognition Systemp. 292
Use of Dimensionality Reduction for Intrusion Detectionp. 306
Author Indexp. 321
Table of Contents provided by Ingram. All Rights Reserved.

Rewards Program

Write a Review