Information systems security = 8th i...
Venkatakrishnan, Venkat.

FindBook      Google Book      Amazon      博客來     
  • Information systems security = 8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Information systems security/ edited by Venkat Venkatakrishnan, Diganta Goswami.
    其他題名: 8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
    其他作者: Venkatakrishnan, Venkat.
    出版者: Berlin, Heidelberg :Springer Berlin Heidelberg : : 2012.,
    面頁冊數: 351 p. :ill., digital ;24 cm.
    內容註: Fighting Malicious Software -- VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security -- Security Assessment of Node.js Platform -- Foundations of Dynamic Access Control -- Risk-Aware RBAC Sessions -- A Cognitive Trust Model for Access Control Framework i MANET -- Trust-OrBAC: A Trust Access Control Model in Multi-Organization Environments -- On Policies and Intents -- ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel -- Keyless Steganography in Spatial Domain Using Energetic Pixels -- Fuzzy Inference Rule Based Reversible Watermarking for Digital Images -- Secure Trust Metadata Management for Mobile Ad-Hoc Networks -- Defence against Wormhole Attacks in Wireless Mesh Networks -- A Novel Key Update Protocol in Mobile Sensor Networks -- Autonomous Certification with List-Based Revocation for Secure V2V Communication -- Mitigating Insider Threat on Database Integrity -- Coercion Resistant MIX for Electronic Auction -- Verification of Money Atomicity in Digital Cash Based Payment System -- Cryptographic Analysis of a Type of Sequence Generators -- Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs -- Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks -- Tracking Insecure Information Flows: A Prototype Evaluator in ASF+SDF -- Attacking Image Based CAPTCHAs Using Image Recognition Techniques -- Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach.
    Contained By: Springer eBooks
    標題: Computer security - Fiction. -
    電子資源: http://dx.doi.org/10.1007/978-3-642-35130-3
    ISBN: 9783642351303 (electronic bk.)
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入