Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | RatnaKumari Challa, VijayaKumari Gunta |
Reed-Muller Code Based Symmetric Key Fully Homomorphic Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 499-508, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hardik Gajera, Shruti Naik, Manik Lal Das |
On the Security of "Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems". ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 324-335, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Srinivas Jangirala, Dheerendra Mishra, Sourav Mukhopadhyay |
Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 45-65, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Lokesh Jain, Aditya Chandran, Sanjay Rawat 0001, Kannan Srinathan |
Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 532-542, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Douglas Simões Silva, Davi Resner, Rick Lopes de Souza, Jean Everson Martina |
Formal Verification of a Cross-Layer, Trustful Space-Time Protocol for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 426-443, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ashish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni |
A Secure Routing Scheme for Wireless Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 393-408, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kyrre Wahl Kongsgård, Nils Agne Nordbotten, Federico Mancini 0001, Paal E. Engelstad |
Data Loss Prevention Based on Text Classification in Controlled Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 131-150, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sharvari Prakash Chorghe, Narendra Shekokar |
A Solution to Detect Phishing in Android Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 461-470, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | S. J. Sheela, K. V. Suresh 0001, Deepaknath Tandur |
Performance Evaluation of Modified Henon Map in Image Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 225-240, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar |
Privacy Preserving Network Analysis of Distributed Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 336-355, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kristof Teichel, Dieter Sibold, Stefan Milius |
An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 3-22, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mridul Sankar Barik, Chandan Mazumdar, Amarnath Gupta |
Network Vulnerability Analysis Using a Constrained Graph Data Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 263-282, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sébastien Canard, Viet Cuong Trinh |
An Efficient Certificateless Signature Scheme in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 175-192, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vineeta Jain, Manoj Singh Gaur, Vijay Laxmi, Mohamed Mosbah 0001 |
Detection of SQLite Database Vulnerabilities in Android Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 521-531, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jerry den Hartog, Nicola Zannone |
Collaborative Access Decisions: Why Has My Decision Not Been Enforced? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 109-130, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sudhir Bagade, Vijay T. Raisinghani |
JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 444-458, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ankit Maheshwari, Samrat Mondal |
SPOSS: Secure Pin-Based-Authentication Obviating Shoulder Surfing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 66-86, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia |
Building a Fair System Using Access Rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 89-108, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sébastien Canard, Viet Cuong Trinh |
Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 193-211, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Maroti Deshmukh, Neeta Nain, Mushtaq Ahmed |
Enhanced Modulo Based Multi Secret Image Sharing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 212-224, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kissan G. Gauns Dessai, Venkatesh V. Kamat |
A Framework for Analyzing Associativity and Anonymity in Conventional and Electronic Summative Examinations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 303-323, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti 0001 (eds.) |
Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![Springer, 978-3-319-49805-8 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sarita Agrawal, Manik Lal Das, Anish Mathuria, Sanjay Srivastava |
Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 419-440, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Angsuman Das, Avishek Adhikari |
Plaintext Checkable Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 324-333, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Imon Mukherjee, Biswajita Datta, Reeturaj Banerjee, Srijan Das |
DWT Difference Modulation Based Novel Steganographic Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 573-582, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shyamalendu Kandar, Bibhas Chandra Dhara |
A (k, n) Multi Secret Sharing Scheme Using Two Variable One Way Function with Less Public Values. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 532-541, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey, Xiaoshu Ji |
Similarity Measure for Security Policies in Service Provider Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 227-242, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Punit Mehta, Jigar Sharda, Manik Lal Das |
SQLshield: Preventing SQL Injection Attacks by Modifying User Input Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 192-206, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Prasuna Sarana, Arindam Roy, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri |
Role Mining in the Presence of Separation of Duty Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 98-117, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aniket Roy, Rajat Subhra Chakraborty, Ruchira Naskar |
Reversible Color Image Watermarking in the YCoCg-R Color Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 480-498, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati |
Data Security Issues in Cloud Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 3-10, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Simon Gansel, Stephan Schnitzer, Ahmad Gilbeau-Hammoud, Viktor Friesen, Frank Dürr, Kurt Rothermel, Christian Maihöfer, Ulrich Krämer |
Context-Aware Access Control in Novel Automotive HMI Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 118-138, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Prandl, Mihai M. Lazarescu, Duc-Son Pham 0001 |
A Study of Web Application Firewall Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 501-510, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dominik Bollmann, Steffen Lortz, Heiko Mantel, Artem Starostin |
An Automatic Inference of Minimal Security Types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 395-415, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ashish Choudhury |
Asynchronous Error-Decodable Secret-Sharing and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 364-377, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Satyajit Banerjee, Debapriyay Mukhopadhyay, Suman Roy 0001 |
A New Threshold Certification Scheme Based Defense Against Sybil Attack for Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 562-572, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Donghoon Chang, Somitra Kumar Sanadhya, Nishant Sharma |
New HMAC Message Patches: Secret Patch and CrOw Patch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 285-302, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Moumita Das, Bhaskar Sardar, Ansuman Banerjee |
Attacks on Branch Predictors: An Empirical Exploration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 511-520, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Toshanlal Meenpal, A. K. Bhattacharjee |
Watermark Removal Attack Extended to Forgery Against Correlation-Based Watermarking Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 463-479, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya |
Enforcing Separation of Duty in Attribute Based Access Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 61-78, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael Kunz, Ludwig Fuchs, Matthias Hummer, Günther Pernul |
Introducing Dynamic Identity and Access Management in Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 139-158, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tom Deering, Ganesh Ram Santhanam, Suresh C. Kothari |
FlowMiner: Automatic Summarization of Library Data-Flow for Malware Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 171-191, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dhruti Sharma, Devesh Jinwala |
Functional Encryption in IoT E-Health Care System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 345-363, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Y. Sreenivasa Rao |
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 521-531, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Phillipa Bennett, Indrakshi Ray, Robert B. France |
Modeling of Online Social Network Policies Using an Attribute-Based Access Control Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 79-97, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sushil Jajodia, Chandan Mazumdar (eds.) |
Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![Springer, 978-3-319-26960-3 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vinod Ganapathy |
Reflections on the Self-service Cloud Computing Project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 36-57, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Radhey Shyam, Yogendra Narain Singh |
Robustness of Score Normalization in Multibiometric Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 542-550, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Santanu Sarkar 0001 |
A New Distinguisher on Grain v1 for 106 Rounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 334-344, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gaurav Somani 0001, Abhinav Johri, Mohit Taneja, Utkarsh Pyne, Manoj Singh Gaur, Dheeraj Sanghi |
DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 263-282, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Payal Chaudhari, Manik Lal Das, Anish Mathuria |
On Anonymous Attribute Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 378-392, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk |
Assessment of an Automatic Correlation Rules Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 207-224, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Haruhisa Kosuge, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa |
Search Algorithm of Precise Integral Distinguisher of Byte-Based Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 303-323, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Goutam Paul 0001 |
Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 161-170, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Paraboschi, Enrico Bacis, Simone Mutti |
Extending Mandatory Access Control Policies in Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 21-35, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | S. Susheel, N. V. Narendra Kumar, R. K. Shyamasundar |
Enforcing Secure Data Sharing in Web Application Development Frameworks Like Django Through Information Flow Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 551-561, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Suchismita Bhattacharjee, Ningrinla Marchang |
Attack-Resistant Trust-Based Weighted Majority Game Rule for Spectrum Sensing in Cognitive Radio Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 441-460, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Anant Pushkar, Nirnay Ghosh, Soumya K. Ghosh 0001 |
A Statistical Approach to Detect Anomalous User Requests in SaaS Cloud-Centric Collaborations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 243-262, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ruggero Donida Labati, Angelo Genovese, Enrique Muñoz Ballester, Vincenzo Piuri, Fabio Scotti, Gianluca Sforza |
Automated Border Control Systems: Biometric Challenges and Research Trends. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings, pp. 11-20, 2015, Springer, 978-3-319-26960-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hiten Choudhury, Basav Roychoudhury, Dilip Kr. Saikia |
A Security Extension Providing User Anonymity and Relaxed Trust Requirement in Non-3GPP Access to the EPS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 226-244, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Victor Heorhiadi, Seyed Kaveh Fayaz, Michael K. Reiter, Vyas Sekar |
SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention Systems via Offloading. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 9-29, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | George Cybenko, Sushil Jajodia, Michael P. Wellman, Peng Liu 0005 |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 1-8, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sumitra Biswal, Goutam Paul 0001, Shashwat Raizada |
Preserving Privacy in Location-Based Services Using Sudoku Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 448-463, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mukti Padhya, Devesh Jinwala |
A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 167-184, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri |
Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 129-148, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Tushar Singhal, Mauro Conti |
Privacy Leakage Attacks in Browsers by Colluding Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 257-276, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Goutam Paul 0001, Pratik Sarkar, Sarbajit Mukherjee |
Towards a More Democratic Mining in Bitcoins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 185-203, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Puneet Gupta 0002, Phalguni Gupta |
A Vein Biometric Based Authentication System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 425-436, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Peter Mayer 0001, Melanie Volkamer, Michaela Kauer |
Authentication Schemes - Comparison and Effective Password Spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 204-225, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Joachim Biskup, Marcel Preuß |
Inference-Proof Data Publishing by Minimally Weakening a Database Instance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 30-49, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Pankaj Malviya, Ruchira Naskar |
Digital Forensic Technique for Double Compression Based JPEG Image Forgery Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 437-447, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar |
A Formal Methodology for Modeling Threats to Enterprise Assets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 149-166, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Thong M. Doan, Han N. Dinh, Nam Tuan Nguyen, Phuoc T. Tran |
Location Obfuscation Framework for Training-Free Localization System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 464-476, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Atul Prakash 0001, Rudrapatna K. Shyamasundar (eds.) |
Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![Springer, 978-3-319-13840-4 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Richard Gay, Jinwei Hu, Heiko Mantel |
CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 378-398, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nilesh Chakraborty, Samrat Mondal |
An Improved Methodology towards Providing Immunity against Weak Shoulder Surfing Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 298-317, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Koen Decroix, Denis Butin, Joachim Jansen, Vincent Naessens |
Inferring Accountability from Trust Perceptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 69-88, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Biswajit Halder, Rajkumar Darbar, Utpal Garain, Abhoy Chand Mondal |
Analysis of Fluorescent Paper Pulps for Detecting Counterfeit Indian Paper Money. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 411-424, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wilayat Khan, Stefano Calzavara, Michele Bugliesi, Willem De Groef, Frank Piessens |
Client Side Web Session Integrity as a Non-interference Property. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 89-108, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tanmay Thakur, Rakesh M. Verma |
Catching Classical and Hijack-Based Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 318-337, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Aditya Basu, Anish Mathuria, Nagendra Chowdary |
Automatic Generation of Compact Alphanumeric Shellcodes for x86. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 399-410, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ramaswamy Ramanujam, Vaishnavi Sundararajan, S. P. Suresh |
Extending Dolev-Yao with Assertions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 50-68, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Krishna Chaitanya Telikicherla, Venkatesh Choppella, Bruhadeshwar Bezawada |
CORP: A Browser Policy to Mitigate Web Infiltration Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 277-297, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Arindam Roy, Shamik Sural, Arun Kumar Majumdar |
Impact of Multiple t-t SMER Constraints on Minimum User Requirement in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 109-128, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Alexandre Vernotte, Frédéric Dadeau, Franck Lebeau, Bruno Legeard, Fabien Peureux, François Piat |
Efficient Detection of Multi-step Cross-Site Scripting Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 358-377, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiaolei Li, Xinshu Dong, Zhenkai Liang |
A Usage-Pattern Perspective for Privacy Ranking of Android Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 245-256, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Paolo Rovelli, Ymir Vigfusson |
PMDS: Permission-Based Malware Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 338-357, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Y. Sreenivasa Rao, Ratna Dutta |
Recipient Anonymous Ciphertext-Policy Attribute Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 329-344, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yasser Sobhdel, Rasool Jalili |
A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 390-401, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dheerendra Mishra, Sourav Mukhopadhyay |
Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 247-254, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Subhamoy Maitra, Sourav Sen Gupta 0001 |
New Long-Term Glimpse of RC4 Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 230-238, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | R. V. Pradweap, R. C. Hansdah |
A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 314-328, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Angsuman Das, Avishek Adhikari |
Signcryption from Randomness Recoverable PKE Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 78-90, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Anuj Shanker Saxena, Vikram Goyal, Debajyoti Bera |
Efficient Enforcement of Privacy for Moving Object Trajectories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 360-374, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Florian Kerschbaum, Martin Härterich, Mathias Kohler, Isabelle Hang, Andreas Schaad, Axel Schröpfer, Walter Tighzert |
An Encrypted In-Memory Column-Store: The Onion Selection Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 14-26, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sourya Joyee De, Asim K. Pal |
Auctions with Rational Adversary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 91-105, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sheethal Kumar, Pai B. J. Jaipal, Sourav Sen Gupta 0001, Vigesh R. Ungrapalli |
Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 199-213, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ankita Chaturvedi, Dheerendra Mishra, Sourav Mukhopadhyay |
Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 63-77, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James |
Monitoring for Slow Suspicious Activities Using a Target Centric Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 163-168, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay, Goutam Paul 0001 |
RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 169-190, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|