Information systems security = 8th i...
Venkatakrishnan, Venkat.

Linked to FindBook      Google Book      Amazon      博客來     
  • Information systems security = 8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Information systems security/ edited by Venkat Venkatakrishnan, Diganta Goswami.
    Reminder of title: 8th international conference, ICISS 2012, Guwahati, India, December 15-19, 2012 : proceedings /
    other author: Venkatakrishnan, Venkat.
    Published: Berlin, Heidelberg :Springer Berlin Heidelberg : : 2012.,
    Description: 351 p. :ill., digital ;24 cm.
    [NT 15003449]: Fighting Malicious Software -- VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security -- Security Assessment of Node.js Platform -- Foundations of Dynamic Access Control -- Risk-Aware RBAC Sessions -- A Cognitive Trust Model for Access Control Framework i MANET -- Trust-OrBAC: A Trust Access Control Model in Multi-Organization Environments -- On Policies and Intents -- ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel -- Keyless Steganography in Spatial Domain Using Energetic Pixels -- Fuzzy Inference Rule Based Reversible Watermarking for Digital Images -- Secure Trust Metadata Management for Mobile Ad-Hoc Networks -- Defence against Wormhole Attacks in Wireless Mesh Networks -- A Novel Key Update Protocol in Mobile Sensor Networks -- Autonomous Certification with List-Based Revocation for Secure V2V Communication -- Mitigating Insider Threat on Database Integrity -- Coercion Resistant MIX for Electronic Auction -- Verification of Money Atomicity in Digital Cash Based Payment System -- Cryptographic Analysis of a Type of Sequence Generators -- Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs -- Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks -- Tracking Insecure Information Flows: A Prototype Evaluator in ASF+SDF -- Attacking Image Based CAPTCHAs Using Image Recognition Techniques -- Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach.
    Contained By: Springer eBooks
    Subject: Computer security - Fiction. -
    Online resource: http://dx.doi.org/10.1007/978-3-642-35130-3
    ISBN: 9783642351303 (electronic bk.)
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login