Advertisement

Information Systems Security

5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings

  • Atul Prakash
  • Indranil Sen Gupta
Conference proceedings ICISS 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5905)

Table of contents

  1. Front Matter
  2. Keynote Talks

    1. Angelos D. Keromytis
      Pages 1-17
    2. Nataraj Nagaratnam
      Pages 18-18
    3. Marc Dacier, Van-Hau Pham, Olivier Thonnard
      Pages 19-37
    4. Venu Govindaraju
      Pages 38-38
  3. Authentication

    1. Matt Smart, Eike Ritter
      Pages 39-54
    2. Massimiliano Masi, Rosario Pugliese, Francesco Tiezzi
      Pages 55-70
    3. Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert Deng
      Pages 71-85
  4. Verification

    1. Michael Adjedj, Julien Bringer, Hervé Chabanne, Bruno Kindarji
      Pages 86-100
    2. P. Bera, S. K. Ghosh, Pallab Dasgupta
      Pages 117-131
  5. Systems Security

    1. Michael K. Reiter, Vyas Sekar, Chad Spensky, Zhenghao Zhang
      Pages 132-147
    2. Zhen Zhang, K. H. (Kane) Kim, Myeong-Ho Kang, Tianran Zhou, Byung-Ho Chung, Shin-Hyo Kim et al.
      Pages 148-162
    3. Ping Chen, Hai Xiao, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie
      Pages 163-177
  6. Behavior Analysis

    1. Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi
      Pages 178-192
    2. Vanessa Frias-Martinez, Salvatore J. Stolfo, Angelos D. Keromytis
      Pages 193-207
  7. Database Security

  8. Cryptography

    1. Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez
      Pages 265-279
    2. Shri Kant Ojha, Naveen Kumar, Kritika Jain, Sangeeta
      Pages 280-291
  9. Short Papers

    1. Jeff Zarnett, Patrick Lam, Mahesh Tripunitara
      Pages 301-309
    2. Nagaraja Kaushik Gampa, Rohit Ashok Khot, Kannan Srinathan
      Pages 310-317
    3. Ravi Mukkamala, Vishnu Kamisetty, Pawankumar Yedugani
      Pages 318-325
  10. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 5th International Conference on Information Systems Security, ICISS 2009, held in Kolkata, India, in December 2009.

The 17 revised full papers and 4 short papers, presented together with 4 keynote talks were carefully reviewed and selected from 85 initial submissions. The papers are organized in topical sections on authentication, verification, systems security, behavior analysis, database security, and cryptography.

Keywords

Radio-Frequency Identification (RFID) access control authentication authorization biometric biometrics complexity copyright protection cryptography intrusion detection network security networks privacy reversibility social networks

Editors and affiliations

  • Atul Prakash
    • 1
  • Indranil Sen Gupta
    • 2
  1. 1.Electrical Engineering and Computer Science DepartmentUniversity of MichiganAnn ArborUSA
  2. 2.Department of Computer Science and EngineeringIndian Institute of Technology KharagpurKharagpurIndia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-10772-6
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-10771-9
  • Online ISBN 978-3-642-10772-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site