Information systems security
Autoři
Více o knize
InhaltsverzeichnisKeynote Address.Security in Practice – Security-Usability Chasm.Network Security.Investigating the Impact of Real-World Factors on Internet Worm Propagation.An OS Security Protection Model for Defeating Attacks from Network.A Secure Intra-domain Routing Protocol for Wireless Mesh Networks.Cryptography.Genetic Algorithm Based Steganography Using Wavelets.Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol.A Near Optimal S-Box Design.Architectures and Systems.A Software Framework for Autonomic Security in Pervasive Environments.DLPKH – Distributed Logical Public-Key Hierarchy.Inference Control in Logic Databases as a Constraint Satisfaction Problem.Cryptanalysis.An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm.Cryptanalysis and the Improvement of Kim et al.’s Password Authentication Schemes.Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures.Keynote Talk.Data Privacy – Problems and Solutions.Protocols.Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals.A Secure and Efficient Multi-authority Proactive Election Scheme.Secure Transaction Management Protocols for MLS/DDBMS.The Curse of Ease of Access to the Internet.Short Papers.A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document.A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks.Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks.A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation.On Knowledge-Based Classification of Abnormal BGP Events.Towards Automated PrivilegeSeparation.Detection and Recognition.Constructing a “Common Cross Site Scripting Vulnerabilities Enumeration (CXE)” Using CWE and CVE.Performance Analysis for Multi Sensor Fingerprint Recognition System.Use of Dimensionality Reduction for Intrusion Detection.