رکورد قبلیرکورد بعدی

" Information Systems Security : "


Document Type : BL
Record Number : 747729
Doc. No : b567680
Main Entry : ICISS 2012, Guwahati, India, December 15-19, 2012 ; Venkat Venkatakrishnan [und weitere] (eds.).
Title & Author : Information Systems Security : : 8th International Conference : proceedings\ ICISS 2012, Guwahati, India, December 15-19, 2012 ; Venkat Venkatakrishnan [und weitere] (eds.).
Publication Statement : Heidelberg : Springer, 2012
Series Statement : Lecture notes in computer science, 7671
ISBN : 3642351298
: : 3642351301
: : 9783642351297
: : 9783642351303
Contents : Fighting Malicious Software.- VulnerableMe: Measuring SystemicWeaknesses in Mobile Browser Security.- Security Assessment of Node.js Platform.- Foundations of Dynamic Access Control.- Risk-Aware RBAC Sessions.- A Cognitive Trust Model for Access Control Framework i MANET.- Trust-OrBAC: A Trust Access Control Model in Multi-Organization Environments.- On Policies and Intents.- ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel.- Keyless Steganography in Spatial Domain Using Energetic Pixels.- Fuzzy Inference Rule Based Reversible Watermarking for Digital Images.- Secure Trust Metadata Management for Mobile Ad-Hoc Networks.- Defence against Wormhole Attacks in Wireless Mesh Networks.- A Novel Key Update Protocol in Mobile Sensor Networks.- Autonomous Certification with List-Based Revocation for Secure V2V Communication.- Mitigating Insider Threat on Database Integrity.- Coercion Resistant MIX for Electronic Auction.- Verification of Money Atomicity in Digital Cash Based Payment System.- Cryptographic Analysis of a Type of Sequence Generators.- Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs.- Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks.- Tracking Insecure Information Flows: A Prototype Evaluator in ASF+SDF.- Attacking Image Based CAPTCHAs Using Image Recognition Techniques.- Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach.
Subject : DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)
Subject : INFORMATIONSSYSTEME (INFORMATIK)
Subject : NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME)
LC Classification : ‭QA76.9.A25‬‭I257 2012‬
Added Entry : Venkat Venkatakrishnan
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟