175 years of Springer publishing +++ Through June 30: 50% off Physics & Astronomy Books

Security and Cryptology

Information Security

8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings

Editors: Zhou, Jianying, Deng, Robert H., Bao, Feng (Eds.)

Buy this book

eBook $109.00
price for USA (gross)
  • ISBN 978-3-540-31930-6
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $139.00
price for USA
  • ISBN 978-3-540-29001-8
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
About this book

This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005. ISC 2005 brought together individuals from academia and - dustry involvedin manyresearchdisciplines of information security to foster the exchange of ideas. During recent years this conference has tried to place special emphasis on the practical aspects of information security, and since it passed from being an international workshop to being an international conference in 2001, it has become one of the most relevant forums at which researchers meet and discuss emerging security challenges and solutions. Advised by the ISC Steering Committee, and in order to provide students with more opportunities for publication, ISC 2005 accepted extra student papers - sides the regular papers. The initiative was very well accepted by the young sector of the scienti?c community, and we hope that the success of this idea will remainfornextISCevents. AnotherimportantfactorforthesuccessofISC2005 was that selected papers in the proceedings will be invited for submission to a special issue of the InternationalJournalof InformationSecurity. The result was an incredible response to the call for papers; we received 271 submissions, the highest since ISC events started. It goes without saying that the paper selection process was more competitive and di?cult than ever before — only 33 regular papers were accepted, plus 5 student papers for a special student session.

Table of contents (38 chapters)

  • A Dynamic Mechanism for Recovering from Buffer Overflow Attacks

    Sidiroglou, Stelios (et al.)

    Pages 1-15

  • SVision: A Network Host-Centered Anomaly Visualization Technique

    Onut, Iosif-Viorel (et al.)

    Pages 16-28

  • Time-Based Release of Confidential Information in Hierarchical Settings

    Nali, Deholo (et al.)

    Pages 29-43

  • “Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery System Experience

    Konstantinou, Elisavet (et al.)

    Pages 44-58

  • A Privacy Preserving Rental System

    Yang, Yanjiang (et al.)

    Pages 59-73

Buy this book

eBook $109.00
price for USA (gross)
  • ISBN 978-3-540-31930-6
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $139.00
price for USA
  • ISBN 978-3-540-29001-8
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Information Security
Book Subtitle
8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings
Editors
  • Jianying Zhou
  • Robert H. Deng
  • Feng Bao
Series Title
Security and Cryptology
Series Volume
3650
Copyright
2005
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-31930-6
DOI
10.1007/11556992
Softcover ISBN
978-3-540-29001-8
Edition Number
1
Number of Pages
XII, 520
Topics