Atjaunināt sīkdatņu piekrišanu

Information Systems Security and Privacy: First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers 1st ed. 2015 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 251 pages, height x width: 235x155 mm, weight: 4044 g, 111 Illustrations, color; XII, 251 p. 111 illus. in color., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 576
  • Izdošanas datums: 01-Jan-2016
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319276670
  • ISBN-13: 9783319276670
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 251 pages, height x width: 235x155 mm, weight: 4044 g, 111 Illustrations, color; XII, 251 p. 111 illus. in color., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 576
  • Izdošanas datums: 01-Jan-2016
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319276670
  • ISBN-13: 9783319276670
This book constitutes revised selected papers from the First International Conference on Information Systems Security and Privacy, ICISSP 2015, held in Angers, France, in February 2015.





The 12 papers presented in this volume were carefully reviewed and selection from a total of 56 submissions. They were organized in topical sections named: data and software security; privacy and confidentiality; mobile systems security; and biometric authentication. The book also contains two invited papers. 
Invited Papers
From Passwords to Biometrics: In Pursuit of a Panacea
3(13)
S.M. Furnell
Privacy in Social Networks: Existing Challenges and Proposals for Solutions
16(15)
Michael Netter
Gunther Pernul
Christian Richthammer
Moritz Riesner
Data and Software Security
MalCore: Toward a Practical Malware Identification System Enhanced with Manycore Technology
31(18)
Taegyu Kim
Ki Woong Park
How to Discover High-Quality Roles? A Survey and Dependency Analysis of Quality Criteria in Role Mining
49(19)
Michael Kunz
Ludwig Fuchs
Michael Netter
Gunther Pernul
An Evasion Resilient Approach to the Detection of Malicious PDF Files
68(21)
Davide Maiorca
Davide Ariu
Igino Corona
Giorgio Giacinto
Privacy and Confidentiality
Privacy Assessment of Data Flow Graphs for an Advanced Recommender System in the Smart Grid
89(18)
Fabian Knirsch
Dominik Engel
Cristian Neureiter
Marc Frincu
Viktor Prasanna
ViSPE: A Graphical Policy Editor for XACML
107(15)
Henrik Nergaard
Nils Ulltveit-Moe
Terje Gjøsaeter
Supporting Streaming Data Anonymization with Expressions of User Privacy Preferences
122(17)
Aderonke Busayo Sakpere
Anne V.D.M. Kayem
Mobile Systems Security
An Efficient Anonymous Authenticated Key Agreement Protocol for Vehicular Ad-Hoc Networks Based on Ring Signatures and the Elliptic Curve Integrated Encryption Scheme
139(21)
Carsten Buttner
Sorin A. Huss
Implicit Authentication for Smartphone Security
160(17)
Wei-Han Lee
Ruby B. Lee
Secure Communication in Civil Drones
177(22)
Abdulhadi Shoufan
Hassan AlNoon
Joonsang Baek
Biometric Authentication
The Palm Vein Graph for Biometric Authentication
199(20)
Arathi Arakala
Hao Hao
Stephen Davis
K.J. Horadam
Impact of External Parameters on the Gait Recognition Using a Smartphone
219(15)
Josselyn Le Moing
Ingo Stengel
EvaBio a New Modular Platform to Evaluate Biometrie System
234(17)
Benoit Vibert
Zhigang Yao
Sylvain Vernois
Jean-Marie Le Bars
Christophe Charrier
Christophe Rosenberger
Author Index 251