Information Systems Security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings
This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015.The 24revised full papers and 8 short papers presented together with 4 invited paperswere carefully reviewed and selected from 133 su...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | 9478 |
creator | Jajodia, Sushil Mazumdar, Chandan |
description | This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015.The 24revised full papers and 8 short papers presented together with 4 invited paperswere carefully reviewed and selected from 133 submissions. The papers addressthe following topics: access control; attacks and mitigation; cloud security;crypto systems and protocols; information flow control; sensor networks andcognitive radio; and watermarking and steganography. |
format | Book |
fullrecord | <record><control><sourceid>proquest_askew</sourceid><recordid>TN_cdi_askewsholts_vlebooks_9783319269610</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC6281457</sourcerecordid><originalsourceid>FETCH-LOGICAL-a25686-4026b0762a54f989f9eb11b624160e268872a93e2b098e51e1c2543f4b76ac793</originalsourceid><addsrcrecordid>eNqNz81Kw0AUBeARUSw1b-CiuBEXgfm9M3eppdZCwUXF7TAJExubZGpmqvTtDcaNrlwdDnwcOCckQ22EYMgBgdHTP_2cTFAIYZBRcUGyGN8opUwhKskn5GrVVaFvXapDN9scY_JtnG18eejrdLwkZ5Vros9-ckpeHhbP88d8_bRcze_WueMKDOSSciioBu6UrNBghb5grAAuGVDPwRjNHQrPC4rGK-ZZyZUUlSw0uFKjmJLbcdjFnf-M29CkaD8aX4Swi_bXncHejHbfh_eDj8l-s9J3qXeNXdzPgRsmlf6HVGqYVjDI61GWLrqm7mrbhi689m6_jVZJpjQw8QXHpGSy</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype><pqid>EBC5578356</pqid></control><display><type>book</type><title>Information Systems Security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings</title><source>Springer Books</source><creator>Jajodia, Sushil ; Mazumdar, Chandan</creator><contributor>Jajoda, Sushil ; Mazumdar, Chandan</contributor><creatorcontrib>Jajodia, Sushil ; Mazumdar, Chandan ; Jajoda, Sushil ; Mazumdar, Chandan</creatorcontrib><description>This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015.The 24revised full papers and 8 short papers presented together with 4 invited paperswere carefully reviewed and selected from 133 submissions. The papers addressthe following topics: access control; attacks and mitigation; cloud security;crypto systems and protocols; information flow control; sensor networks andcognitive radio; and watermarking and steganography.</description><edition>1st ed. 2015</edition><identifier>ISBN: 9783319269610</identifier><identifier>ISBN: 3319269615</identifier><identifier>ISBN: 9783319269603</identifier><identifier>ISBN: 3319269607</identifier><identifier>EISBN: 9783319269610</identifier><identifier>EISBN: 3319269615</identifier><identifier>OCLC: 933389103</identifier><language>eng</language><publisher>Cham: Springer Nature</publisher><subject>Computer programming, programs, data ; Computer security ; Computers ; Information networks</subject><creationdate>2015</creationdate><tpages>587</tpages><format>587</format><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>LNCS sublibrary. SL 4, Security and cryptology</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>306,776,780,782</link.rule.ids></links><search><contributor>Jajoda, Sushil</contributor><contributor>Mazumdar, Chandan</contributor><creatorcontrib>Jajodia, Sushil</creatorcontrib><creatorcontrib>Mazumdar, Chandan</creatorcontrib><title>Information Systems Security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings</title><description>This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015.The 24revised full papers and 8 short papers presented together with 4 invited paperswere carefully reviewed and selected from 133 submissions. The papers addressthe following topics: access control; attacks and mitigation; cloud security;crypto systems and protocols; information flow control; sensor networks andcognitive radio; and watermarking and steganography.</description><subject>Computer programming, programs, data</subject><subject>Computer security</subject><subject>Computers</subject><subject>Information networks</subject><isbn>9783319269610</isbn><isbn>3319269615</isbn><isbn>9783319269603</isbn><isbn>3319269607</isbn><isbn>9783319269610</isbn><isbn>3319269615</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2015</creationdate><recordtype>book</recordtype><sourceid>I4C</sourceid><recordid>eNqNz81Kw0AUBeARUSw1b-CiuBEXgfm9M3eppdZCwUXF7TAJExubZGpmqvTtDcaNrlwdDnwcOCckQ22EYMgBgdHTP_2cTFAIYZBRcUGyGN8opUwhKskn5GrVVaFvXapDN9scY_JtnG18eejrdLwkZ5Vros9-ckpeHhbP88d8_bRcze_WueMKDOSSciioBu6UrNBghb5grAAuGVDPwRjNHQrPC4rGK-ZZyZUUlSw0uFKjmJLbcdjFnf-M29CkaD8aX4Swi_bXncHejHbfh_eDj8l-s9J3qXeNXdzPgRsmlf6HVGqYVjDI61GWLrqm7mrbhi689m6_jVZJpjQw8QXHpGSy</recordid><startdate>2015</startdate><enddate>2015</enddate><creator>Jajodia, Sushil</creator><creator>Mazumdar, Chandan</creator><general>Springer Nature</general><general>Springer International Publishing AG</general><general>Springer</general><scope>I4C</scope></search><sort><creationdate>2015</creationdate><title>Information Systems Security</title><author>Jajodia, Sushil ; Mazumdar, Chandan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a25686-4026b0762a54f989f9eb11b624160e268872a93e2b098e51e1c2543f4b76ac793</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Computer programming, programs, data</topic><topic>Computer security</topic><topic>Computers</topic><topic>Information networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Jajodia, Sushil</creatorcontrib><creatorcontrib>Mazumdar, Chandan</creatorcontrib><collection>Casalini Torrossa eBook Single Purchase</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jajodia, Sushil</au><au>Mazumdar, Chandan</au><au>Jajoda, Sushil</au><au>Mazumdar, Chandan</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>Information Systems Security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings</btitle><seriestitle>LNCS sublibrary. SL 4, Security and cryptology</seriestitle><date>2015</date><risdate>2015</risdate><volume>9478</volume><isbn>9783319269610</isbn><isbn>3319269615</isbn><isbn>9783319269603</isbn><isbn>3319269607</isbn><eisbn>9783319269610</eisbn><eisbn>3319269615</eisbn><abstract>This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015.The 24revised full papers and 8 short papers presented together with 4 invited paperswere carefully reviewed and selected from 133 submissions. The papers addressthe following topics: access control; attacks and mitigation; cloud security;crypto systems and protocols; information flow control; sensor networks andcognitive radio; and watermarking and steganography.</abstract><cop>Cham</cop><pub>Springer Nature</pub><oclcid>933389103</oclcid><tpages>587</tpages><edition>1st ed. 2015</edition></addata></record> |
fulltext | fulltext |
identifier | ISBN: 9783319269610 |
ispartof | |
issn | |
language | eng |
recordid | cdi_askewsholts_vlebooks_9783319269610 |
source | Springer Books |
subjects | Computer programming, programs, data Computer security Computers Information networks |
title | Information Systems Security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T03%3A54%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_askew&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=Information%20Systems%20Security:%2011th%20International%20Conference,%20ICISS%202015,%20Kolkata,%20India,%20December%2016-20,%202015.%20Proceedings&rft.au=Jajodia,%20Sushil&rft.date=2015&rft.volume=9478&rft.isbn=9783319269610&rft.isbn_list=3319269615&rft.isbn_list=9783319269603&rft.isbn_list=3319269607&rft_id=info:doi/&rft_dat=%3Cproquest_askew%3EEBC6281457%3C/proquest_askew%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783319269610&rft.eisbn_list=3319269615&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC5578356&rft_id=info:pmid/&rfr_iscdi=true |