Narrow your search

Library

AP (4)

KDG (4)

VUB (4)

KU Leuven (3)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

UCLL (3)

ULB (3)

ULiège (3)

More...

Resource type

book (9)

digital (4)


Language

English (12)


Year
From To Submit

2025 (1)

2024 (1)

2015 (2)

2011 (3)

2005 (5)

Listing 1 - 10 of 12 << page
of 2
>>
Sort by

Book
Information Systems Security : 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings
Authors: ---
ISBN: 3319269607 3319269615 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in December 2015. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 133 submissions. The papers address the following topics: access control; attacks and mitigation; cloud security; crypto systems and protocols; information flow control; sensor networks and cognitive radio; and watermarking and steganography.

Keywords

Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Security measures --- Distributed processing --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer --- Data encryption (Computer science)


Digital
Information Systems Security (vol. # 3803) : First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings
Authors: ---
ISBN: 9783540324225 Year: 2005 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Digital
Information Systems Security : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings
Authors: ---
ISBN: 9783642255601 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Digital
Information Systems Security : 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings
Authors: ---
ISBN: 9783319269610 9783319269603 9783319269627 Year: 2015 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in December 2015. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 133 submissions. The papers address the following topics: access control; attacks and mitigation; cloud security; crypto systems and protocols; information flow control; sensor networks and cognitive radio; and watermarking and steganography.


Book
Information Systems Security : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings
Authors: --- ---
ISBN: 3642255590 3642255604 Year: 2011 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011. The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security.

Keywords

Computer security --- Information networks --- Computer networks --- Computers --- Data encryption (Computer science) --- Data protection --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Computer Science --- Access control --- Security measures --- Information Technology --- Computer Science (Hardware & Networks) --- Automated information networks --- Networks, Information --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Information storage and retrieval. --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Information Storage and Retrieval. --- Management of Computing and Information Systems. --- Data Encryption. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Distributed processing --- Information storage and retrieva. --- Information Systems. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Datensicherung. --- Informationssystem. --- Kryptoanalyse. --- Privatsphäre. --- Rechnernetz. --- Zugriffskontrolle. --- Information services --- Information storage and retrieval systems --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Information Systems Security : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings
Authors: --- ---
ISBN: 9783642255601 Year: 2011 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011. The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security.


Book
Information Systems Security : First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings
Authors: --- ---
ISBN: 9783540324225 Year: 2005 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19-21, 2005 at Jadavpur University, Kolkata, India. The objectives of the conference were to discuss in depth the current state of the research and practice in information systems security, enable participants to bene?tfrompersonalcontactwithotherresearchersandexpandtheirknowledge, and disseminate the research results. This volumecontains 4 invitedpapers,19refereedpapersthat werepresented at the conference, and 5 ongoing project summaries. The refereed papers, which were selected from the 72 submissions, were rigorouslyreviewed by the Program Committee members. The volume provides researcherswith a broad perspective of recent developments in information systems security. A special note of thanks goes to the many volunteers whose e?orts made this conference a success. We wish to thank Prem Chand, Ernesto Damiani, Patrick McDaniel, R. Sekar, and Vijay Varadharajan for agreeing to deliver the invited talks, the authors for their worthy contributions, and the referees for their time and e?ort in reviewing the papers. We are grateful to Arun Majumdar and Aditya Bagchi for serving as the General Chairs. Last, but certainly not least, our thanks go to Vijay Kowtha of the U.S. O?ce ofNaval ResearchGlobal and MichaelCheetham of the INDO-US Science & Technology Forum for providing the generous ?nancial support.


Book
Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings
Authors: --- --- ---
Year: 2005 Publisher: Berlin ; New York : Springer,


Book
Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings
Authors: --- --- ---
Year: 2005 Publisher: Berlin ; New York : Springer,


Book
Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings
Authors: --- --- ---
Year: 2005 Publisher: Berlin ; New York : Springer,

Listing 1 - 10 of 12 << page
of 2
>>
Sort by