ICISS 2012, Guwahati, India, December 15-19, 2012 ; Venkat Venkatakrishnan [und weitere] (eds.).
وضعیت نشر و پخش و غیره
محل نشرو پخش و غیره
Heidelberg
نام ناشر، پخش کننده و غيره
Springer
تاریخ نشرو بخش و غیره
2012
فروست
عنوان فروست
Lecture notes in computer science, 7671
یادداشتهای مربوط به مندرجات
متن يادداشت
Fighting Malicious Software.- VulnerableMe: Measuring SystemicWeaknesses in Mobile Browser Security.- Security Assessment of Node.js Platform.- Foundations of Dynamic Access Control.- Risk-Aware RBAC Sessions.- A Cognitive Trust Model for Access Control Framework i MANET.- Trust-OrBAC: A Trust Access Control Model in Multi-Organization Environments.- On Policies and Intents.- ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel.- Keyless Steganography in Spatial Domain Using Energetic Pixels.- Fuzzy Inference Rule Based Reversible Watermarking for Digital Images.- Secure Trust Metadata Management for Mobile Ad-Hoc Networks.- Defence against Wormhole Attacks in Wireless Mesh Networks.- A Novel Key Update Protocol in Mobile Sensor Networks.- Autonomous Certification with List-Based Revocation for Secure V2V Communication.- Mitigating Insider Threat on Database Integrity.- Coercion Resistant MIX for Electronic Auction.- Verification of Money Atomicity in Digital Cash Based Payment System.- Cryptographic Analysis of a Type of Sequence Generators.- Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs.- Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks.- Tracking Insecure Information Flows: A Prototype Evaluator in ASF+SDF.- Attacking Image Based CAPTCHAs Using Image Recognition Techniques.- Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach.