Skip to main content
  • Conference proceedings
  • © 2007

Information Systems Security

Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4812)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISS: International Conference on Information Systems Security

Conference proceedings info: ICISS 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

  2. Keynote Address

  3. Network Security

    1. Investigating the Impact of Real-World Factors on Internet Worm Propagation

      • Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Jun Li
      Pages 10-24
    2. An OS Security Protection Model for Defeating Attacks from Network

      • Zhiyong Shan, Qiuyue Wang, Xiaofeng Meng
      Pages 25-36
    3. A Secure Intra-domain Routing Protocol for Wireless Mesh Networks

      • Ramanarayana Kandikattu, Lillykutty Jacob
      Pages 37-50
  4. Cryptography

    1. Genetic Algorithm Based Steganography Using Wavelets

      • K. B. Raja, Kiran Kumar K., Satish Kumar N., M. S. Lakshmi, H. Preeti, K. R. Venugopal et al.
      Pages 51-63
    2. A Near Optimal S-Box Design

      • Debojyoti Bhattacharya, Nitin Bansal, Amitava Banerjee, Dipanwita RoyChowdhury
      Pages 77-90
  5. Architectures and Systems

    1. A Software Framework for Autonomic Security in Pervasive Environments

      • Anshuman Saxena, Marc Lacoste, Tahar Jarboui, Ulf Lücking, Bernd Steinke
      Pages 91-109
    2. DLPKH – Distributed Logical Public-Key Hierarchy

      • Rakesh Bobba, Himanshu Khurana
      Pages 110-127
    3. Inference Control in Logic Databases as a Constraint Satisfaction Problem

      • Joachim Biskup, Dominique Marc Burgard, Torben Weibert, Lena Wiese
      Pages 128-142
  6. Keynote Talk

    1. Data Privacy – Problems and Solutions

      • Sabrina De Capitani di Vimercati, Pierangela Samarati
      Pages 180-192
  7. Protocols

    1. Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals

      • G. K. Patra, V. Anil Kumar, R. P. Thangavelu
      Pages 193-207
    2. A Secure and Efficient Multi-authority Proactive Election Scheme

      • Ashish Kumar Singh, Priya Chandran
      Pages 208-218
    3. Secure Transaction Management Protocols for MLS/DDBMS

      • Navdeep Kaur, Rajwinder Singh, Manoj Misra, A. K. Sarje
      Pages 219-233
  8. Keynote Talk

    1. The Curse of Ease of Access to the Internet

      • Kotagiri Ramamohanarao, Kapil Kumar Gupta, Tao Peng, Christopher Leckie
      Pages 234-249
  9. Short Papers

    1. A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document

      • G. Gupta, R. Sultania, S. Mondal, S. K. Saha, B. Chanda
      Pages 250-253

Other Volumes

  1. Information Systems Security

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access