default search action
3rd ICISS 2007: Delhi, India
- Patrick D. McDaniel, Shyam K. Gupta:
Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings. Lecture Notes in Computer Science 4812, Springer 2007, ISBN 978-3-540-77085-5
Keynote Address
- Atul Prakash:
Security in Practice - Security-Usability Chasm. 1-9
Network Security
- Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Jun Li:
Investigating the Impact of Real-World Factors on Internet Worm Propagation. 10-24 - Zhiyong Shan, Qiuyue Wang, Xiaofeng Meng:
An OS Security Protection Model for Defeating Attacks from Network. 25-36 - Ramanarayana Kandikattu, Lillykutty Jacob:
A Secure Intra-domain Routing Protocol for Wireless Mesh Networks. 37-50
Cryptography
- K. B. Raja, Kiran Kumar K., Satish Kumar N., M. S. Lakshmi, H. Preeti, K. R. Venugopal, Lalit M. Patnaik:
Genetic Algorithm Based Steganography Using Wavelets. 51-63 - Meng-Hui Lim, Sanggon Lee, Sang-Jae Moon:
Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol. 64-76 - Debojyoti Bhattacharya, Nitin Bansal, Amitava Banerjee, Dipanwita Roy Chowdhury:
A Near Optimal S-Box Design. 77-90
Architectures and Systems
- Anshuman Saxena, Marc Lacoste, Tahar Jarboui, Ulf Lücking, Bernd Steinke:
A Software Framework for Autonomic Security in Pervasive Environments. 91-109 - Rakeshbabu Bobba, Himanshu Khurana:
DLPKH - Distributed Logical Public-Key Hierarchy. 110-127 - Joachim Biskup, Dominique Marc Burgard, Torben Weibert, Lena Wiese:
Inference Control in Logic Databases as a Constraint Satisfaction Problem. 128-142
Cryptanalysis
- Christophe Clavier:
An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm. 143-155 - Debasis Giri, Parmeshwary Dayal Srivastava:
Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. 156-166 - Hidema Tanaka:
Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures. 167-179
Keynote Talk
- Sabrina De Capitani di Vimercati, Pierangela Samarati:
Data Privacy - Problems and Solutions. 180-192
Protocols
- G. K. Patra, V. Anil Kumar, R. P. Thangavelu:
Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals. 193-207 - Ashish Kumar Singh, Priya Chandran:
A Secure and Efficient Multi-authority Proactive Election Scheme. 208-218 - Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje:
Secure Transaction Management Protocols for MLS/DDBMS. 219-233
Keynote Talk
- Kotagiri Ramamohanarao, Kapil Kumar Gupta, Tao Peng, Christopher Leckie:
The Curse of Ease of Access to the Internet. 234-249
Short Papers
- Gaurav Gupta, R. Sultania, Sounak Mondal, Sanjoy Kumar Saha, Bhabatosh Chanda:
A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document. 250-253 - Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi:
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks. 254-258 - Anjali Sardana, Ramesh Chandra Joshi:
Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks. 259-262 - G. K. Patra, V. Anil Kumar, R. P. Thangavelu:
A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation. 263-266 - Jun Li, Dejing Dou, Shiwoong Kim, Han Qin, Yibo Wang:
On Knowledge-Based Classification of Abnormal BGP Events. 267-271 - Dhananjay Bapat, Kevin R. B. Butler, Patrick D. McDaniel:
Towards Automated Privilege Separation. 272-276
Detection and Recognition
- K. Sivakumar, K. Garg:
Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration (CXE)" Using CWE and CVE. 277-291 - Shimon K. Modi, Stephen J. Elliott, Hakil Kim:
Performance Analysis for Multi Sensor Fingerprint Recognition System. 292-305 - Subrat Kumar Dash, Sanjay Rawat, Arun K. Pujari:
Use of Dimensionality Reduction for Intrusion Detection. 306-320
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.