Information systems security : third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings / Patrick McDaniel, Shyam K. Gupta (eds.).

By: ICISS (Conference) (2007 : Delhi, India)
Contributor(s): McDaniel, Patrick (Patrick Drew) | Gupta, Shyam K
Material type: TextTextSeries: SerienbezeichnungLecture notes in computer science: 4812.; LNCS sublibrary: Publisher: Berlin ; New York : Springer, ©2007Description: 1 online resource (xiii, 322 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783540770862; 3540770860; 9783540770855; 3540770852Other title: ICISS 2007Subject(s): Computer security -- Congresses | Information networks -- Access control -- Congresses | Computers -- Access control -- Congresses | Information networks -- Access control | Computers -- Access control | Computer security | Informatique | Computer security | Computers -- Access control | Information networks -- Access control | Anwendungssystem | Authentifikation | Computersicherheit | Datensicherung | Informationssystem | Kryptosystem | Verteiltes System | Zugriffskontrolle | Telecommunications | Computer Science | Engineering & Applied Sciences | Electrical & Computer Engineering | computers | samenleving | society | informatieontsluiting | information retrieval | informatieopslag | information storage | informatiesystemen | information systems | computerwetenschappen | computer sciences | computernetwerken | computer networks | gegevensbeheer | data management | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Conference papers and proceedings. | Delhi (2007) | Kongress. Additional physical formats: Print version:: Information systems security.DDC classification: 005.8 LOC classification: QA76.9.A25 | I5545 2007ebOther classification: TP309-532 | SS 4800 | DAT 461f | DAT 460f Online resources: Click here to access online
Contents:
Keynote address: Security in practice : security-usability chasm / Atul Prakesh -- Network security -- Cryptography -- Architectures and systems -- Cryptanalysis -- Keynote talk -- Protocols -- Kenote talk: The curse of ease of access to the Internet / Kotagiri Ramamohanarao [and others] -- Short papers -- Detection and recognition.
Summary: This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS 2007, held in Delhi, India, in December 2007. The 18 revised full papers and 5 short papers presented together with 4 keynote papers were carefully reviewed and selected from 78 submissions. The submitted topics in cryptography, intrusion detection, network security, information flow systems, Web security, and many others offer a detailed view of the state of the art in information security. The papers are organized in topical sections on network security, cryptography, architectures and systems, cryptanalysis, protocols, detection and recognition, as well as short papers.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references and index.

Keynote address: Security in practice : security-usability chasm / Atul Prakesh -- Network security -- Cryptography -- Architectures and systems -- Cryptanalysis -- Keynote talk -- Protocols -- Kenote talk: The curse of ease of access to the Internet / Kotagiri Ramamohanarao [and others] -- Short papers -- Detection and recognition.

Print version record.

This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS 2007, held in Delhi, India, in December 2007. The 18 revised full papers and 5 short papers presented together with 4 keynote papers were carefully reviewed and selected from 78 submissions. The submitted topics in cryptography, intrusion detection, network security, information flow systems, Web security, and many others offer a detailed view of the state of the art in information security. The papers are organized in topical sections on network security, cryptography, architectures and systems, cryptanalysis, protocols, detection and recognition, as well as short papers.

There are no comments for this item.

to post a comment.

Powered by Koha