Editors:
State-of-the-art research
Fast-track conference proceedings
Unique visibility
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7671)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ICISS: International Conference on Information Systems Security
Conference proceedings info: ICISS 2012.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, access via your institution.
Table of contents (24 papers)
-
Front Matter
-
Invited Talk I
-
Technical Session I: Software Security
-
Invited Talk II
-
Invited Talk III
-
Technical Session V: Database and Distributed Systems Security
-
Technical Session VI: Network Security II
About this book
Keywords
- application security
- denial of service
- information hiding
- malicious transactions
- reversible watermarking
Editors and Affiliations
-
Department of Computer Science, University of Illinois at Chicago, Chicago, USA
Venkat Venkatakrishnan
-
Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati, India
Diganta Goswami
Bibliographic Information
Book Title: Information Systems Security
Book Subtitle: 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings
Editors: Venkat Venkatakrishnan, Diganta Goswami
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-35130-3
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2012
Softcover ISBN: 978-3-642-35129-7Published: 25 October 2012
eBook ISBN: 978-3-642-35130-3Published: 11 December 2012
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVI, 353
Number of Illustrations: 96 b/w illustrations
Topics: Computer Communication Networks, Systems and Data Security, Information Systems Applications (incl. Internet), Information Storage and Retrieval, Management of Computing and Information Systems, Cryptology