Information Systems Security

4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings

Editors:

ISBN: 978-3-540-89861-0 (Print) 978-3-540-89862-7 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Keynote Address

    1. No Access

      Book Chapter

      Pages 1-25

      BitBlaze: A New Approach to Computer Security via Binary Analysis

  3. Languages and Formal Methods

    1. No Access

      Book Chapter

      Pages 26-40

      On the Decidability of Model-Checking Information Flow Properties

    2. No Access

      Book Chapter

      Pages 41-55

      Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties

    3. No Access

      Book Chapter

      Pages 56-70

      Implicit Flows: Can’t Live with ‘Em, Can’t Live without ‘Em

  4. Protocols

    1. No Access

      Book Chapter

      Pages 71-85

      A Robust Reputation Scheme for Decentralized Group Management Systems

    2. No Access

      Book Chapter

      Pages 86-101

      Complexity of Checking Freshness of Cryptographic Protocols

    3. No Access

      Book Chapter

      Pages 102-115

      Secure Internet Voting Based on Paper Ballots

  5. Short Papers

    1. No Access

      Book Chapter

      Pages 116-123

      A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper)

    2. No Access

      Book Chapter

      Pages 124-131

      A Framework for Trustworthy Service-Oriented Computing (Short Paper)

    3. No Access

      Book Chapter

      Pages 132-139

      Revisiting Bluetooth Security (Short Paper)

    4. No Access

      Book Chapter

      Pages 140-147

      A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper)

  6. Keynote Address

    1. No Access

      Book Chapter

      Pages 148-153

      Computing on Encrypted Data

  7. Ongoing Research

    1. No Access

      Book Chapter

      Pages 154-155

      Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators

    2. No Access

      Book Chapter

      Pages 156-157

      Proxy Re-signature Schemes

  8. Keynote Address

    1. No Access

      Book Chapter

      Pages 158-172

      Fast Signature Matching Using Extended Finite Automaton (XFA)

  9. Intrusion Detection

    1. No Access

      Book Chapter

      Pages 173-187

      Real-Time Alert Correlation with Type Graphs

    2. No Access

      Book Chapter

      Pages 188-202

      Incorporation of Application Layer Protocol Syntax into Anomaly Detection

    3. No Access

      Book Chapter

      Pages 203-220

      A Parallel Architecture for Stateful, High-Speed Intrusion Detection

  10. Biometrics, Forensics and Steganography

    1. No Access

      Book Chapter

      Pages 221-234

      Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion

    2. No Access

      Book Chapter

      Pages 235-242

      Audio Watermarking Based on Quantization in Wavelet Domain

previous Page of 2