Atjaunināt sīkdatņu piekrišanu

E-grāmata: Information Systems Security: 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 10063
  • Izdošanas datums: 24-Nov-2016
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319498065
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 10063
  • Izdošanas datums: 24-Nov-2016
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319498065
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016.





The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security. 
Attacks and Mitigation
An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms
3(20)
Kristof Teichel
Dieter Sibold
Stefan Milius
Practical DoS Attacks on Embedded Networks in Commercial Vehicles
23(22)
Subhojeet Mukherjee
Hossein Shirazi
Indrakshi Ray
Jeremy Daily
Rose Gamble
Authentication
Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment
45(21)
Srinivas Jangirala
Dheerendra Mishra
Sourav Mukhopadhyay
SPOSS: Secure Pin-Based-Authentication Obviating Shoulder Surfing
66(23)
Ankit Maheshwari
Samrat Mondal
Authorization and Information Flow Control
Building a Fair System Using Access Rights
89(20)
Nada Essaouini
Frederic Cuppens
Nora Cuppens-Boulahia
Collaborative Access Decisions: Why Has My Decision Not Been Enforced?
109(22)
Jerry den Hartog
Nicola Zannone
Data Loss Prevention Based on Text Classification in Controlled Environments
131(20)
Kyrre Wahl Kongsgard
Nils Agne Nordbotten
Federico Mancini
Paal E. Engelstad
Defining Abstract Semantics for Static Dependence Analysis of Relational Database Applications
151(24)
Angshuman Jana
Raju Halder
Cryptosystem and Protocols
An Efficient Certificateless Signature Scheme in the Standard Model
175(18)
Sebastien Canard
Viet Cuong Trinh
Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption
193(19)
Sebastien Canard
Viet Cuong Trinh
Enhanced Modulo Based Multi Secret Image Sharing Scheme
212(13)
Maroti Deshmukh
Neeta Nain
Mushtaq Ahmed
Performance Evaluation of Modified Henon Map in Image Encryption
225(18)
S.J. Sheela
K.V. Suresh
Deepaknath Tandur
Network Security and Intrusion Detection
Network Counter-Attack Strategy by Topology Map Analysis
243(20)
Hidema Tanaka
Network Vulnerability Analysis Using a Constrained Graph Data Model
263(20)
Mridul Sankar Barik
Chandan Mazumdar
Amarnath Gupta
Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid
283(20)
Surendra Singh
Sachin Tripathi
Suvadip Batabyal
Privacy
A Framework for Analyzing Associativity and Anonymity in Conventional and Electronic Summative Examinations
303(21)
Kissan Gauns Dessai
Venkatesh Kamat
On the Security of "Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems"
324(12)
Hardik Gajera
Shruti Naik
Manik Lal Das
Privacy Preserving Network Analysis of Distributed Social Networks
336(23)
Varsha Bhat Kukkala
Jaspal Singh Saini
S.R.S. Iyengar
Software Security
Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data
359(13)
Sanat Ghoshal
Goutam Paul
Risk Evaluation of X.509 Certificates -- A Machine Learning Application
372(21)
Varsharani Hawanna
Vrushali Kulkarni
Rashmi Rane
Pooja Joshi
Wireless, Mobile and IoT Security
A Secure Routing Scheme for Wireless Mesh Networks
393(16)
Ashish Nanda
Priyadarsi Nanda
Xiangjian He
Aruna Jamdagni
Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches
409(17)
Venkata Udaya Sameer
S. Sugumaran
Ruchira Naskar
Formal Verification of a Cross-Layer, Trustful Space-Time Protocol for Wireless Sensor Networks
426(18)
Douglas Simoes Silva
Davi Resner
Rick Lopes de Souza
Jean Everson Martina
JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET
444(17)
Sudhir Bagade
Vijay Raisinghani
Short Papers
A Solution to Detect Phishing in Android Devices
461(10)
Sharvari Prakash Chorghe
Narendra Shekokar
Feature Selection for Effective Botnet Detection Based on Periodicity of Traffic
471(8)
T. Harsha
S. Asha
B. Soniya
Honeypot Deployment in Broadband Networks
479(10)
Saurabh Chamotra
Rakesh Kumar Sehgal
Sanjeev Ror
Bhupendra singh
Generic Construction of Certificateless Signcryption Scheme
489(10)
Jayaprakash Kar
Kshirasagar Naik
Reed-Muller Code Based Symmetric Key Fully Homomorphic Encryption Scheme
499(10)
RatnaKumari Challa
VijayaKumari Gunta
Towards Useful Anomaly Detection for Back Office Networks
509(12)
Omer Yuksel
Jerry den Hartog
Sandro Etalle
Detection of SQLite Database Vulnerabilities in Android Apps
521(11)
Vineeta Jain
M.S. Gaur
Vijay Laxmi
Mohamed Mosbah
Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach
532(11)
Lokesh Jain
Aditya Chandran
Sanjay Rawat
Kannan Srinathan
Author Index 543