Information Systems Security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings

This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015.The 24revised full papers and 8 short papers presented together with 4 invited paperswere carefully reviewed and selected from 133 su...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Jajodia, Sushil, Mazumdar, Chandan
Format: Buch
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume 9478
creator Jajodia, Sushil
Mazumdar, Chandan
description This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015.The 24revised full papers and 8 short papers presented together with 4 invited paperswere carefully reviewed and selected from 133 submissions. The papers addressthe following topics: access control; attacks and mitigation; cloud security;crypto systems and protocols; information flow control; sensor networks andcognitive radio; and watermarking and steganography.
format Book
fullrecord <record><control><sourceid>proquest_askew</sourceid><recordid>TN_cdi_askewsholts_vlebooks_9783319269610</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC6281457</sourcerecordid><originalsourceid>FETCH-LOGICAL-a25686-4026b0762a54f989f9eb11b624160e268872a93e2b098e51e1c2543f4b76ac793</originalsourceid><addsrcrecordid>eNqNz81Kw0AUBeARUSw1b-CiuBEXgfm9M3eppdZCwUXF7TAJExubZGpmqvTtDcaNrlwdDnwcOCckQ22EYMgBgdHTP_2cTFAIYZBRcUGyGN8opUwhKskn5GrVVaFvXapDN9scY_JtnG18eejrdLwkZ5Vros9-ckpeHhbP88d8_bRcze_WueMKDOSSciioBu6UrNBghb5grAAuGVDPwRjNHQrPC4rGK-ZZyZUUlSw0uFKjmJLbcdjFnf-M29CkaD8aX4Swi_bXncHejHbfh_eDj8l-s9J3qXeNXdzPgRsmlf6HVGqYVjDI61GWLrqm7mrbhi689m6_jVZJpjQw8QXHpGSy</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype><pqid>EBC5578356</pqid></control><display><type>book</type><title>Information Systems Security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings</title><source>Springer Books</source><creator>Jajodia, Sushil ; Mazumdar, Chandan</creator><contributor>Jajoda, Sushil ; Mazumdar, Chandan</contributor><creatorcontrib>Jajodia, Sushil ; Mazumdar, Chandan ; Jajoda, Sushil ; Mazumdar, Chandan</creatorcontrib><description>This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015.The 24revised full papers and 8 short papers presented together with 4 invited paperswere carefully reviewed and selected from 133 submissions. The papers addressthe following topics: access control; attacks and mitigation; cloud security;crypto systems and protocols; information flow control; sensor networks andcognitive radio; and watermarking and steganography.</description><edition>1st ed. 2015</edition><identifier>ISBN: 9783319269610</identifier><identifier>ISBN: 3319269615</identifier><identifier>ISBN: 9783319269603</identifier><identifier>ISBN: 3319269607</identifier><identifier>EISBN: 9783319269610</identifier><identifier>EISBN: 3319269615</identifier><identifier>OCLC: 933389103</identifier><language>eng</language><publisher>Cham: Springer Nature</publisher><subject>Computer programming, programs, data ; Computer security ; Computers ; Information networks</subject><creationdate>2015</creationdate><tpages>587</tpages><format>587</format><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>LNCS sublibrary. SL 4, Security and cryptology</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>306,776,780,782</link.rule.ids></links><search><contributor>Jajoda, Sushil</contributor><contributor>Mazumdar, Chandan</contributor><creatorcontrib>Jajodia, Sushil</creatorcontrib><creatorcontrib>Mazumdar, Chandan</creatorcontrib><title>Information Systems Security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings</title><description>This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015.The 24revised full papers and 8 short papers presented together with 4 invited paperswere carefully reviewed and selected from 133 submissions. The papers addressthe following topics: access control; attacks and mitigation; cloud security;crypto systems and protocols; information flow control; sensor networks andcognitive radio; and watermarking and steganography.</description><subject>Computer programming, programs, data</subject><subject>Computer security</subject><subject>Computers</subject><subject>Information networks</subject><isbn>9783319269610</isbn><isbn>3319269615</isbn><isbn>9783319269603</isbn><isbn>3319269607</isbn><isbn>9783319269610</isbn><isbn>3319269615</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2015</creationdate><recordtype>book</recordtype><sourceid>I4C</sourceid><recordid>eNqNz81Kw0AUBeARUSw1b-CiuBEXgfm9M3eppdZCwUXF7TAJExubZGpmqvTtDcaNrlwdDnwcOCckQ22EYMgBgdHTP_2cTFAIYZBRcUGyGN8opUwhKskn5GrVVaFvXapDN9scY_JtnG18eejrdLwkZ5Vros9-ckpeHhbP88d8_bRcze_WueMKDOSSciioBu6UrNBghb5grAAuGVDPwRjNHQrPC4rGK-ZZyZUUlSw0uFKjmJLbcdjFnf-M29CkaD8aX4Swi_bXncHejHbfh_eDj8l-s9J3qXeNXdzPgRsmlf6HVGqYVjDI61GWLrqm7mrbhi689m6_jVZJpjQw8QXHpGSy</recordid><startdate>2015</startdate><enddate>2015</enddate><creator>Jajodia, Sushil</creator><creator>Mazumdar, Chandan</creator><general>Springer Nature</general><general>Springer International Publishing AG</general><general>Springer</general><scope>I4C</scope></search><sort><creationdate>2015</creationdate><title>Information Systems Security</title><author>Jajodia, Sushil ; Mazumdar, Chandan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a25686-4026b0762a54f989f9eb11b624160e268872a93e2b098e51e1c2543f4b76ac793</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Computer programming, programs, data</topic><topic>Computer security</topic><topic>Computers</topic><topic>Information networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Jajodia, Sushil</creatorcontrib><creatorcontrib>Mazumdar, Chandan</creatorcontrib><collection>Casalini Torrossa eBook Single Purchase</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jajodia, Sushil</au><au>Mazumdar, Chandan</au><au>Jajoda, Sushil</au><au>Mazumdar, Chandan</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>Information Systems Security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings</btitle><seriestitle>LNCS sublibrary. SL 4, Security and cryptology</seriestitle><date>2015</date><risdate>2015</risdate><volume>9478</volume><isbn>9783319269610</isbn><isbn>3319269615</isbn><isbn>9783319269603</isbn><isbn>3319269607</isbn><eisbn>9783319269610</eisbn><eisbn>3319269615</eisbn><abstract>This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015.The 24revised full papers and 8 short papers presented together with 4 invited paperswere carefully reviewed and selected from 133 submissions. The papers addressthe following topics: access control; attacks and mitigation; cloud security;crypto systems and protocols; information flow control; sensor networks andcognitive radio; and watermarking and steganography.</abstract><cop>Cham</cop><pub>Springer Nature</pub><oclcid>933389103</oclcid><tpages>587</tpages><edition>1st ed. 2015</edition></addata></record>
fulltext fulltext
identifier ISBN: 9783319269610
ispartof
issn
language eng
recordid cdi_askewsholts_vlebooks_9783319269610
source Springer Books
subjects Computer programming, programs, data
Computer security
Computers
Information networks
title Information Systems Security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T03%3A54%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_askew&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=Information%20Systems%20Security:%2011th%20International%20Conference,%20ICISS%202015,%20Kolkata,%20India,%20December%2016-20,%202015.%20Proceedings&rft.au=Jajodia,%20Sushil&rft.date=2015&rft.volume=9478&rft.isbn=9783319269610&rft.isbn_list=3319269615&rft.isbn_list=9783319269603&rft.isbn_list=3319269607&rft_id=info:doi/&rft_dat=%3Cproquest_askew%3EEBC6281457%3C/proquest_askew%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783319269610&rft.eisbn_list=3319269615&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC5578356&rft_id=info:pmid/&rfr_iscdi=true