Advertisement

Information Systems Security

Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings

  • Editors
  • Patrick McDaniel
  • Shyam K. Gupta
Conference proceedings ICISS 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4812)

Table of contents

  1. Front Matter
  2. Keynote Address

  3. Network Security

    1. Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Jun Li
      Pages 10-24
    2. Zhiyong Shan, Qiuyue Wang, Xiaofeng Meng
      Pages 25-36
    3. Ramanarayana Kandikattu, Lillykutty Jacob
      Pages 37-50
  4. Cryptography

    1. K. B. Raja, Kiran Kumar K., Satish Kumar N., M. S. Lakshmi, H. Preeti, K. R. Venugopal et al.
      Pages 51-63
    2. Debojyoti Bhattacharya, Nitin Bansal, Amitava Banerjee, Dipanwita RoyChowdhury
      Pages 77-90
  5. Architectures and Systems

    1. Anshuman Saxena, Marc Lacoste, Tahar Jarboui, Ulf Lücking, Bernd Steinke
      Pages 91-109
    2. Rakesh Bobba, Himanshu Khurana
      Pages 110-127
    3. Joachim Biskup, Dominique Marc Burgard, Torben Weibert, Lena Wiese
      Pages 128-142
  6. Cryptanalysis

  7. Keynote Talk

    1. Sabrina De Capitani di Vimercati, Pierangela Samarati
      Pages 180-192
  8. Protocols

    1. G. K. Patra, V. Anil Kumar, R. P. Thangavelu
      Pages 193-207
    2. Ashish Kumar Singh, Priya Chandran
      Pages 208-218
    3. Navdeep Kaur, Rajwinder Singh, Manoj Misra, A. K. Sarje
      Pages 219-233
  9. Keynote Talk

    1. Kotagiri Ramamohanarao, Kapil Kumar Gupta, Tao Peng, Christopher Leckie
      Pages 234-249
  10. Short Papers

    1. G. Gupta, R. Sultania, S. Mondal, S. K. Saha, B. Chanda
      Pages 250-253
    2. Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zorufi
      Pages 254-258
    3. G. K. Patra, V. Anil Kumar, R. P. Thangavelu
      Pages 263-266
    4. Jun Li, Dejing Dou, Shiwoong Kim, Han Qin, Yibo Wang
      Pages 267-271
    5. Dhananjay Bapat, Kevin Butler, Patrick McDaniel
      Pages 272-276
  11. Detection and Recognition

    1. Shimon Modi, Stephen Elliott, Hakil Kim
      Pages 292-305
    2. Subrat Kumar Dash, Sanjay Rawat, Arun K. Pujari
      Pages 306-320
  12. Back Matter

About these proceedings

Keywords

Denial of Service Internet Routing Scanner access control algorithms authorization broadcast encryption chaotic cryptosystems concurrency control data security inference control printer privacy security

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-77086-2
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-77085-5
  • Online ISBN 978-3-540-77086-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site