Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | RatnaKumari Challa, VijayaKumari Gunta |
Reed-Muller Code Based Symmetric Key Fully Homomorphic Encryption Scheme. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hardik Gajera, Shruti Naik, Manik Lal Das |
On the Security of "Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems". |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Srinivas Jangirala, Dheerendra Mishra, Sourav Mukhopadhyay |
Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Lokesh Jain, Aditya Chandran, Sanjay Rawat 0001, Kannan Srinathan |
Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Douglas Simões Silva, Davi Resner, Rick Lopes de Souza, Jean Everson Martina |
Formal Verification of a Cross-Layer, Trustful Space-Time Protocol for Wireless Sensor Networks. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ashish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni |
A Secure Routing Scheme for Wireless Mesh Networks. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kyrre Wahl Kongsgård, Nils Agne Nordbotten, Federico Mancini 0001, Paal E. Engelstad |
Data Loss Prevention Based on Text Classification in Controlled Environments. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sharvari Prakash Chorghe, Narendra Shekokar |
A Solution to Detect Phishing in Android Devices. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | S. J. Sheela, K. V. Suresh 0001, Deepaknath Tandur |
Performance Evaluation of Modified Henon Map in Image Encryption. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar |
Privacy Preserving Network Analysis of Distributed Social Networks. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kristof Teichel, Dieter Sibold, Stefan Milius |
An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mridul Sankar Barik, Chandan Mazumdar, Amarnath Gupta |
Network Vulnerability Analysis Using a Constrained Graph Data Model. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sébastien Canard, Viet Cuong Trinh |
An Efficient Certificateless Signature Scheme in the Standard Model. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vineeta Jain, Manoj Singh Gaur, Vijay Laxmi, Mohamed Mosbah 0001 |
Detection of SQLite Database Vulnerabilities in Android Apps. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jerry den Hartog, Nicola Zannone |
Collaborative Access Decisions: Why Has My Decision Not Been Enforced? |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sudhir Bagade, Vijay T. Raisinghani |
JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ankit Maheshwari, Samrat Mondal |
SPOSS: Secure Pin-Based-Authentication Obviating Shoulder Surfing. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia |
Building a Fair System Using Access Rights. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sébastien Canard, Viet Cuong Trinh |
Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Maroti Deshmukh, Neeta Nain, Mushtaq Ahmed |
Enhanced Modulo Based Multi Secret Image Sharing Scheme. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kissan G. Gauns Dessai, Venkatesh V. Kamat |
A Framework for Analyzing Associativity and Anonymity in Conventional and Electronic Summative Examinations. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti 0001 (eds.) |
Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sarita Agrawal, Manik Lal Das, Anish Mathuria, Sanjay Srivastava |
Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Angsuman Das, Avishek Adhikari |
Plaintext Checkable Signcryption. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Imon Mukherjee, Biswajita Datta, Reeturaj Banerjee, Srijan Das |
DWT Difference Modulation Based Novel Steganographic Algorithm. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shyamalendu Kandar, Bibhas Chandra Dhara |
A (k, n) Multi Secret Sharing Scheme Using Two Variable One Way Function with Less Public Values. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey, Xiaoshu Ji |
Similarity Measure for Security Policies in Service Provider Selection. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Punit Mehta, Jigar Sharda, Manik Lal Das |
SQLshield: Preventing SQL Injection Attacks by Modifying User Input Data. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Prasuna Sarana, Arindam Roy, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri |
Role Mining in the Presence of Separation of Duty Constraints. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aniket Roy, Rajat Subhra Chakraborty, Ruchira Naskar |
Reversible Color Image Watermarking in the YCoCg-R Color Space. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati |
Data Security Issues in Cloud Scenarios. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Simon Gansel, Stephan Schnitzer, Ahmad Gilbeau-Hammoud, Viktor Friesen, Frank Dürr, Kurt Rothermel, Christian Maihöfer, Ulrich Krämer |
Context-Aware Access Control in Novel Automotive HMI Systems. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Prandl, Mihai M. Lazarescu, Duc-Son Pham 0001 |
A Study of Web Application Firewall Solutions. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dominik Bollmann, Steffen Lortz, Heiko Mantel, Artem Starostin |
An Automatic Inference of Minimal Security Types. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ashish Choudhury |
Asynchronous Error-Decodable Secret-Sharing and Its Application. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Satyajit Banerjee, Debapriyay Mukhopadhyay, Suman Roy 0001 |
A New Threshold Certification Scheme Based Defense Against Sybil Attack for Sensor Networks. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Donghoon Chang, Somitra Kumar Sanadhya, Nishant Sharma |
New HMAC Message Patches: Secret Patch and CrOw Patch. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Moumita Das, Bhaskar Sardar, Ansuman Banerjee |
Attacks on Branch Predictors: An Empirical Exploration. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Toshanlal Meenpal, A. K. Bhattacharjee |
Watermark Removal Attack Extended to Forgery Against Correlation-Based Watermarking Schemes. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya |
Enforcing Separation of Duty in Attribute Based Access Control Systems. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael Kunz, Ludwig Fuchs, Matthias Hummer, Günther Pernul |
Introducing Dynamic Identity and Access Management in Organizations. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tom Deering, Ganesh Ram Santhanam, Suresh C. Kothari |
FlowMiner: Automatic Summarization of Library Data-Flow for Malware Analysis. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dhruti Sharma, Devesh Jinwala |
Functional Encryption in IoT E-Health Care System. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Y. Sreenivasa Rao |
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Phillipa Bennett, Indrakshi Ray, Robert B. France |
Modeling of Online Social Network Policies Using an Attribute-Based Access Control Framework. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sushil Jajodia, Chandan Mazumdar (eds.) |
Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vinod Ganapathy |
Reflections on the Self-service Cloud Computing Project. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Radhey Shyam, Yogendra Narain Singh |
Robustness of Score Normalization in Multibiometric Systems. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Santanu Sarkar 0001 |
A New Distinguisher on Grain v1 for 106 Rounds. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gaurav Somani 0001, Abhinav Johri, Mohit Taneja, Utkarsh Pyne, Manoj Singh Gaur, Dheeraj Sanghi |
DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Payal Chaudhari, Manik Lal Das, Anish Mathuria |
On Anonymous Attribute Based Encryption. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk |
Assessment of an Automatic Correlation Rules Generator. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Haruhisa Kosuge, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa |
Search Algorithm of Precise Integral Distinguisher of Byte-Based Block Cipher. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Goutam Paul 0001 |
Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Paraboschi, Enrico Bacis, Simone Mutti |
Extending Mandatory Access Control Policies in Android. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | S. Susheel, N. V. Narendra Kumar, R. K. Shyamasundar |
Enforcing Secure Data Sharing in Web Application Development Frameworks Like Django Through Information Flow Control. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Suchismita Bhattacharjee, Ningrinla Marchang |
Attack-Resistant Trust-Based Weighted Majority Game Rule for Spectrum Sensing in Cognitive Radio Networks. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Anant Pushkar, Nirnay Ghosh, Soumya K. Ghosh 0001 |
A Statistical Approach to Detect Anomalous User Requests in SaaS Cloud-Centric Collaborations. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ruggero Donida Labati, Angelo Genovese, Enrique Muñoz Ballester, Vincenzo Piuri, Fabio Scotti, Gianluca Sforza |
Automated Border Control Systems: Biometric Challenges and Research Trends. |
ICISS |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hiten Choudhury, Basav Roychoudhury, Dilip Kr. Saikia |
A Security Extension Providing User Anonymity and Relaxed Trust Requirement in Non-3GPP Access to the EPS. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Victor Heorhiadi, Seyed Kaveh Fayaz, Michael K. Reiter, Vyas Sekar |
SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention Systems via Offloading. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | George Cybenko, Sushil Jajodia, Michael P. Wellman, Peng Liu 0005 |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sumitra Biswal, Goutam Paul 0001, Shashwat Raizada |
Preserving Privacy in Location-Based Services Using Sudoku Structures. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mukti Padhya, Devesh Jinwala |
A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri |
Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Tushar Singhal, Mauro Conti |
Privacy Leakage Attacks in Browsers by Colluding Extensions. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Goutam Paul 0001, Pratik Sarkar, Sarbajit Mukherjee |
Towards a More Democratic Mining in Bitcoins. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Puneet Gupta 0002, Phalguni Gupta |
A Vein Biometric Based Authentication System. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Peter Mayer 0001, Melanie Volkamer, Michaela Kauer |
Authentication Schemes - Comparison and Effective Password Spaces. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Joachim Biskup, Marcel Preuß |
Inference-Proof Data Publishing by Minimally Weakening a Database Instance. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Pankaj Malviya, Ruchira Naskar |
Digital Forensic Technique for Double Compression Based JPEG Image Forgery Detection. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar |
A Formal Methodology for Modeling Threats to Enterprise Assets. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Thong M. Doan, Han N. Dinh, Nam Tuan Nguyen, Phuoc T. Tran |
Location Obfuscation Framework for Training-Free Localization System. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Atul Prakash 0001, Rudrapatna K. Shyamasundar (eds.) |
Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Richard Gay, Jinwei Hu, Heiko Mantel |
CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nilesh Chakraborty, Samrat Mondal |
An Improved Methodology towards Providing Immunity against Weak Shoulder Surfing Attack. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Koen Decroix, Denis Butin, Joachim Jansen, Vincent Naessens |
Inferring Accountability from Trust Perceptions. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Biswajit Halder, Rajkumar Darbar, Utpal Garain, Abhoy Chand Mondal |
Analysis of Fluorescent Paper Pulps for Detecting Counterfeit Indian Paper Money. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wilayat Khan, Stefano Calzavara, Michele Bugliesi, Willem De Groef, Frank Piessens |
Client Side Web Session Integrity as a Non-interference Property. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tanmay Thakur, Rakesh M. Verma |
Catching Classical and Hijack-Based Phishing Attacks. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Aditya Basu, Anish Mathuria, Nagendra Chowdary |
Automatic Generation of Compact Alphanumeric Shellcodes for x86. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ramaswamy Ramanujam, Vaishnavi Sundararajan, S. P. Suresh |
Extending Dolev-Yao with Assertions. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Krishna Chaitanya Telikicherla, Venkatesh Choppella, Bruhadeshwar Bezawada |
CORP: A Browser Policy to Mitigate Web Infiltration Attacks. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Arindam Roy, Shamik Sural, Arun Kumar Majumdar |
Impact of Multiple t-t SMER Constraints on Minimum User Requirement in RBAC. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Alexandre Vernotte, Frédéric Dadeau, Franck Lebeau, Bruno Legeard, Fabien Peureux, François Piat |
Efficient Detection of Multi-step Cross-Site Scripting Vulnerabilities. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiaolei Li, Xinshu Dong, Zhenkai Liang |
A Usage-Pattern Perspective for Privacy Ranking of Android Apps. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Paolo Rovelli, Ymir Vigfusson |
PMDS: Permission-Based Malware Detection System. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Y. Sreenivasa Rao, Ratna Dutta |
Recipient Anonymous Ciphertext-Policy Attribute Based Encryption. |
ICISS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yasser Sobhdel, Rasool Jalili |
A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm. |
ICISS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dheerendra Mishra, Sourav Mukhopadhyay |
Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols. |
ICISS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Subhamoy Maitra, Sourav Sen Gupta 0001 |
New Long-Term Glimpse of RC4 Stream Cipher. |
ICISS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | R. V. Pradweap, R. C. Hansdah |
A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET. |
ICISS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Angsuman Das, Avishek Adhikari |
Signcryption from Randomness Recoverable PKE Revisited. |
ICISS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Anuj Shanker Saxena, Vikram Goyal, Debajyoti Bera |
Efficient Enforcement of Privacy for Moving Object Trajectories. |
ICISS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Florian Kerschbaum, Martin Härterich, Mathias Kohler, Isabelle Hang, Andreas Schaad, Axel Schröpfer, Walter Tighzert |
An Encrypted In-Memory Column-Store: The Onion Selection Problem. |
ICISS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sourya Joyee De, Asim K. Pal |
Auctions with Rational Adversary. |
ICISS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sheethal Kumar, Pai B. J. Jaipal, Sourav Sen Gupta 0001, Vigesh R. Ungrapalli |
Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing. |
ICISS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ankita Chaturvedi, Dheerendra Mishra, Sourav Mukhopadhyay |
Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card. |
ICISS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James |
Monitoring for Slow Suspicious Activities Using a Target Centric Approach. |
ICISS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay, Goutam Paul 0001 |
RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers. |
ICISS |
2013 |
DBLP DOI BibTeX RDF |
|