Information Systems Security : 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings - Atul Prakash

Information Systems Security

5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings

By: Atul Prakash (Editor)

Paperback | 24 November 2009

At a Glance

Paperback


$101.07

or 4 interest-free payments of $25.27 with

 or 

Aims to ship in 7 to 10 business days

Keynote Talks.- A Survey of Voice over IP Security Research.- Security for a Smarter Planet.- The WOMBAT Attack Attribution Method: Some Results.- Biometrics and Security.- Authentication.- Remote Electronic Voting with Revocable Anonymity.- On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals.- On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.- Verification.- Biometric Identification over Encrypted Data Made Feasible.- Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity.- Formal Verification of Security Policy Implementations in Enterprise Networks.- Systems Security.- Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles.- An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products.- DROP: Detecting Return-Oriented Programming Malicious Code.- Behavior Analysis.- A Framework for Behavior-Based Malware Analysis in the Cloud.- BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs.- Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders.- Database Security.- Database Relation Watermarking Resilient against Secondary Watermarking Attacks.- A Robust Damage Assessment Model for Corrupted Database Systems.- A Generic Distortion Free Watermarking Technique for Relational Databases.- Cryptography.- On Some Weaknesses in the Disk Encryption Schemes EME and EME2.- TWIS - A Lightweight Block Cipher.- Short Papers.- Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking.- Method-Specific Java Access Control via RMI Proxy Objects Using Annotations.- Let Only the Right One IN: Privacy Management Scheme for Social Network.- Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper).

More in Network Hardware

Applied Embedded Electronics : Design Essentials for Robust Systems - Jerry Twomey
Practical Monitoring : Effective Strategies for the Real World - Mike Julian
Designing Embedded Hardware 2e : O'Reilly Ser. - John Catsoulis

RRP $95.00

$43.25

54%
OFF
Cisco IOS in a Nutshell : In a Nutshell (O'Reilly) - James Boney
JUNOS Cookbook : Cookbooks (O'Reilly) - Aviva Garrett

RRP $104.50

$46.90

55%
OFF
Getting Started with Netduino : OREILLY - Chris Walker

RRP $38.00

$23.75

37%
OFF
Ethernet Switches - Charles Spurgeon

RRP $24.75

$16.95

32%
OFF
CEH Certified Ethical Hacker Bundle, Fourth Edition - Matt Walker