Information Systems Security [electronic resource] : 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings / edited by Venkat Venkatakrishnan, Diganta Goswami.
Material type:
TextLanguage: English Series: Lecture Notes in Computer Science ; 7671Publication details: Berlin, Heidelberg : Springer Berlin Heidelberg, 2012.Description: 1 online resource (XVI, 353 p. 96 ill.)ISBN: - 9783642351303
| Item type | Current library | Call number | Materials specified | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
|
|
National Library of India | Available | EBK000023868ENG |
Fighting Malicious Software -- VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security -- Security Assessment of Node.js Platform -- Foundations of Dynamic Access Control -- Risk-Aware RBAC Sessions -- A Cognitive Trust Model for Access Control Framework i MANET -- Trust-OrBAC: A Trust Access Control Model in Multi-Organization Environments -- On Policies and Intents -- ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel -- Keyless Steganography in Spatial Domain Using Energetic Pixels -- Fuzzy Inference Rule Based Reversible Watermarking for Digital Images -- Secure Trust Metadata Management for Mobile Ad-Hoc Networks -- Defence against Wormhole Attacks in Wireless Mesh Networks -- A Novel Key Update Protocol in Mobile Sensor Networks -- Autonomous Certification with List-Based Revocation for Secure V2V Communication -- Mitigating Insider Threat on Database Integrity -- Coercion Resistant MIX for Electronic Auction -- Verification of Money Atomicity in Digital Cash Based Payment System -- Cryptographic Analysis of a Type of Sequence Generators -- Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs -- Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks -- Tracking Insecure Information Flows: A Prototype Evaluator in ASF+SDF -- Attacking Image Based CAPTCHAs Using Image Recognition Techniques -- Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach.
There are no comments on this title.
