↓ Skip to main content

Information Systems Security

Overview of attention for book
Cover of 'Information Systems Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Fighting Malicious Software
  3. Altmetric Badge
    Chapter 2 VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security
  4. Altmetric Badge
    Chapter 3 Security Assessment of Node.js Platform
  5. Altmetric Badge
    Chapter 4 Foundations of Dynamic Access Control
  6. Altmetric Badge
    Chapter 5 Risk-Aware RBAC Sessions
  7. Altmetric Badge
    Chapter 6 A Cognitive Trust Model for Access Control Framework in MANET
  8. Altmetric Badge
    Chapter 7 Trust-orBAC : A Trust Access Control Model in Multi-Organization Environments
  9. Altmetric Badge
    Chapter 8 On Policies and Intents
  10. Altmetric Badge
    Chapter 9 ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel
  11. Altmetric Badge
    Chapter 10 Keyless Steganography in Spatial Domain Using Energetic Pixels
  12. Altmetric Badge
    Chapter 11 Fuzzy Inference Rule Based Reversible Watermarking for Digital Images
  13. Altmetric Badge
    Chapter 12 Secure Trust Metadata Management for Mobile Ad-Hoc Networks
  14. Altmetric Badge
    Chapter 13 Defence against Wormhole Attacks in Wireless Mesh Networks
  15. Altmetric Badge
    Chapter 14 A Novel Key Update Protocol in Mobile Sensor Networks
  16. Altmetric Badge
    Chapter 15 Autonomous Certification with List-Based Revocation for Secure V2V Communication
  17. Altmetric Badge
    Chapter 16 Mitigating Insider Threat on Database Integrity
  18. Altmetric Badge
    Chapter 17 Coercion Resistant MIX for Electronic Auction
  19. Altmetric Badge
    Chapter 18 Verification of Money Atomicity in Digital Cash Based Payment System
  20. Altmetric Badge
    Chapter 19 Cryptographic Analysis of a Type of Sequence Generators
  21. Altmetric Badge
    Chapter 20 Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs
  22. Altmetric Badge
    Chapter 21 Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks
  23. Altmetric Badge
    Chapter 22 Tracking Insecure Information Flows: A Prototype Evaluator in ASF+SDF
  24. Altmetric Badge
    Chapter 23 Attacking Image Based CAPTCHAs Using Image Recognition Techniques
  25. Altmetric Badge
    Chapter 24 Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

3 X users

Readers on

2 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Information Systems Security
Published by
Springer Berlin Heidelberg, December 2012
DOI 10.1007/978-3-642-35130-3
978-3-64-235129-7, 978-3-64-235130-3

Venkatakrishnan, Venkat, Goswami, Diganta

X Demographics

X Demographics

The data shown below were collected from the profiles of 3 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 2 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Brazil 1 50%
Unknown 1 50%

Demographic breakdown

Readers by professional status Count As %
Student > Bachelor 1 50%
Researcher 1 50%
Readers by discipline Count As %
Computer Science 2 100%