Get Free Shipping on orders over $79
Information Systems Security : 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings - Atul Prakash

Information Systems Security

5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings

By: Atul Prakash (Editor)

Paperback | 24 November 2009

At a Glance

Paperback


$84.99

or 4 interest-free payments of $21.25 with

 or 

Ships in 5 to 7 business days

Keynote Talks.- A Survey of Voice over IP Security Research.- Security for a Smarter Planet.- The WOMBAT Attack Attribution Method: Some Results.- Biometrics and Security.- Authentication.- Remote Electronic Voting with Revocable Anonymity.- On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals.- On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.- Verification.- Biometric Identification over Encrypted Data Made Feasible.- Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity.- Formal Verification of Security Policy Implementations in Enterprise Networks.- Systems Security.- Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles.- An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products.- DROP: Detecting Return-Oriented Programming Malicious Code.- Behavior Analysis.- A Framework for Behavior-Based Malware Analysis in the Cloud.- BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs.- Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders.- Database Security.- Database Relation Watermarking Resilient against Secondary Watermarking Attacks.- A Robust Damage Assessment Model for Corrupted Database Systems.- A Generic Distortion Free Watermarking Technique for Relational Databases.- Cryptography.- On Some Weaknesses in the Disk Encryption Schemes EME and EME2.- TWIS - A Lightweight Block Cipher.- Short Papers.- Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking.- Method-Specific Java Access Control via RMI Proxy Objects Using Annotations.- Let Only the Right One IN: Privacy Management Scheme for Social Network.- Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper).

More in Network Hardware

Bluetooth LE Audio : Fundamental to Recent Advances - Himanshu Bhalla

RRP $183.00

$162.75

11%
OFF
Practical Monitoring : Effective Strategies for the Real World - Mike Julian
Computer Viruses and Malware : Advances In Information Security - John Aycock
Designing Embedded Hardware 2e : O'Reilly Ser. - John Catsoulis

RRP $95.00

$43.75

54%
OFF
UNIX in a Nutshell : In a Nutshell - Arnold Robbins

RRP $85.75

$43.75

49%
OFF
Cisco IOS in a Nutshell : In a Nutshell - James Boney

RRP $75.99

$30.00

61%
OFF
JUNOS Cookbook : Cookbooks (O'Reilly) - Aviva Garrett

RRP $104.75

$41.00

61%
OFF
Juniper QFX5100 Series - Douglas Richard, Jr. Hanks

RRP $114.00

$45.00

61%
OFF
JUNOS Enterprise Switching : OREILLY - Harry Reynolds

RRP $133.00

$53.00

60%
OFF
Getting Started with Netduino : OREILLY - Chris Walker

RRP $38.00

$15.00

61%
OFF
Getting Started with Bluetooth Low Energy - Carles Cufi Akiba

RRP $85.75

$34.00

60%
OFF
Applied Embedded Electronics : Design Essentials for Robust Systems - Jerry Twomey
Cryptocurrency Mining For Dummies : 2nd Edition - Peter Kent

RRP $49.95

$42.75

14%
OFF