Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ganugula Umadevi, Ashutosh Saxena |
Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 121-132, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Naveen Kumar 0011, Anish Mathuria, Manik Lal Das |
Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme - (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 191-198, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mathieu Jaume, Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong, Ludovic Mé |
Secure States versus Secure Executions - From Access Control to Flow Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 148-162, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aditya Bagchi, Indrakshi Ray (eds.) |
Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![Springer, 978-3-642-45203-1 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens |
A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 106-120, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Lorenzi, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri |
Web Services Based Attacks against Image CAPTCHAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 214-229, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nabanita Mukherjee, Ayon Bhattacharya, Siddhartha Sekhar Bose |
Evolutionary Multibit Grouping Steganographic Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 285-296, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri, Stephane Morucci |
Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 133-147, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Samiran Bag, Sushmita Ruj, Bimal K. Roy |
Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 43-62, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chris Clifton, Balamurugan Anandan |
Challenges and Opportunities for Security with Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 1-13, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Manisha Sharma, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya |
An Administrative Model for Spatio-Temporal Role Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 375-389, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Beng Heng Ng, Atul Prakash 0001 |
Let the Right One in: Discovering and Mitigating Permission Gaps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 297-313, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kerim Yasin Oktay, Vaibhav Khadilkar, Murat Kantarcioglu, Sharad Mehrotra |
Risk Aware Approach to Data Confidentiality in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 27-42, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Imon Mukherjee, Goutam Paul 0001 |
Efficient Multi-bit Image Steganography in Spatial Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 270-284, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Santanu Sarkar 0001, Sourav Sen Gupta 0001, Subhamoy Maitra |
Error Correction of Partially Exposed RSA Private Keys from MSB Side. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 345-359, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa |
Information Theoretical Analysis of Side-Channel Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 255-269, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Soumyadev Maity, Ramesh C. Hansdah |
A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 239-246, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Soumyadev Maity, Ramesh C. Hansdah |
Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 277-293, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chaitrali Amrutkar, Kapil Singh, Arunabh Verma, Patrick Traynor |
VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 16-34, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jaydeep Howlader, Jayanta Kar, Ashis Kumar Mal |
Coercion Resistant MIX for Electronic Auction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 238-248, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Kruegel |
Fighting Malicious Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 1-15, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Matthew L. Bolton, Celeste M. Wallace, Lenore D. Zuck |
On Policies and Intents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 104-118, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Y. Sreenivasa Rao, Ratna Dutta |
Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 294-309, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu |
Risk-Aware RBAC Sessions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 59-74, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Andres Ojamaa, Karl Düüna |
Security Assessment of Node.js Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 35-43, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Girish Chandra, Divakar Yadav |
Verification of Money Atomicity in Digital Cash Based Payment System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 249-264, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Doaa Hassan |
Tracking Insecure Information Flows: A Prototype Evaluator in ASF+SDF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 310-326, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Rakesh Matam, Somanath Tripathy |
Defence against Wormhole Attacks in Wireless Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 181-193, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Arne Swinnen, Raoul Strackx, Pieter Philippaerts, Frank Piessens |
ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 119-133, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Anup Kumar Bhattacharya, Abhijit Das 0004, Dipanwita Roy Chowdhury, Aravind Iyer, Debojyoti Bhattacharya |
Autonomous Certification with List-Based Revocation for Secure V2V Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 208-222, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vivek Natarajan, Yi Yang 0002, Sencun Zhu |
Secure Trust Metadata Management for Mobile Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 164-180, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Weihan Li, Brajendra Panda, Qussai Yaseen |
Mitigating Insider Threat on Database Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 223-237, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Soumya Maity, Soumya Kanti Ghosh 0001 |
A Cognitive Trust Model for Access Control Framework in MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 75-88, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Prasad Naldurg |
Foundations of Dynamic Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 44-58, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alberto Peinado, Amparo Fúster-Sabater |
Cryptographic Analysis of a Type of Sequence Generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 265-276, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Simin Ghasemi, Morteza Noferesti, Mohammad Ali Hadavi, Sadegh Dorri Nogoorani, Rasool Jalili |
Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 343-351, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Venkat N. Venkatakrishnan, Diganta Goswami (eds.) |
Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![Springer, 978-3-642-35129-7 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Khalifa Toumi, César Andrés, Ana R. Cavalli |
Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 89-103, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | David Lorenzi, Jaideep Vaidya, Emre Uzun, Shamik Sural, Vijayalakshmi Atluri |
Attacking Image Based CAPTCHAs Using Image Recognition Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 327-342, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Goutam Paul 0001, Ian Davidson, Imon Mukherjee, S. S. Ravi |
Keyless Steganography in Spatial Domain Using Energetic Pixels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 134-148, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ruchira Naskar, Rajat Subhra Chakraborty |
Fuzzy Inference Rule Based Reversible Watermarking for Digital Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 149-163, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sarita Agrawal, Rodrigo Roman, Manik Lal Das, Anish Mathuria, Javier López 0001 |
A Novel Key Update Protocol in Mobile Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings, pp. 194-207, 2012, Springer, 978-3-642-35129-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips |
Towards Detection of Botnet Communication through Social Media by Monitoring User Activity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 131-143, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sushil Jajodia, Chandan Mazumdar (eds.) |
Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![Springer, 978-3-642-25559-5 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Anuj Shanker Saxena, Mayank Pundir, Vikram Goyal, Debajyoti Bera |
Preserving Location Privacy for Continuous Queries on Known Route. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 265-279, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Prithu Banerjee, Mahasweta Mitra, Ferdous A. Barbhuiya, Sandip Chakraborty, Sukumar Nandi |
An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 294-308, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Filippo Del Tedesco, Sebastian Hunt, David Sands 0001 |
A Semantic Hierarchy for Erasure Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 352-369, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tanusha S. Nadkarni, Radhesh Mohandas, Alwyn R. Pais |
IFrandbox - Client Side Protection from Malicious Injected Iframes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 383-386, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Meilof Veeningen, Benne de Weger, Nicola Zannone |
Formal Privacy Analysis of Communication Protocols for Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 235-249, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Julien A. Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia |
Consistency Policies for Dynamic Information Systems with Declassification Flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 87-101, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | William Enck |
Defending Users against Smartphone Apps: Techniques and Future Directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 49-70, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Apurba Das, Subhamoy Maitra, Goutam Paul 0001, Santanu Sarkar 0001 |
Some Combinatorial Results towards State Recovery Attack on RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 204-214, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yan Huang 0001, Chih-Hao Shen, David Evans 0001, Jonathan Katz, Abhi Shelat |
Efficient Secure Computation with Garbled Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 28-48, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dimitris Geneiatakis, Georgios Portokalidis, Angelos D. Keromytis |
A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 322-336, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Olga Gadyatskaya, Eduardo Lostal, Fabio Massacci |
Load Time Security Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 250-264, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Morteza Noferesti, Mohammad Ali Hadavi, Rasool Jalili |
A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 374-378, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Harini Ragavan, Brajendra Panda |
Mitigation of Malicious Modifications by Insiders in Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 337-351, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Christian A. Schneider, Jonas Pfoh, Claudia Eckert 0001 |
A Universal Semantic Bridge for Virtual Machine Introspection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 370-373, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Winfried E. Kühnhauser, Anja Pölck |
Towards Access Control Model Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 379-382, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lorenzo Cavallaro, R. Sekar 0001 |
Taint-Enhanced Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 160-174, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ruchira Naskar, Rajat Subhra Chakraborty |
Reversible Image Watermarking through Coordinate Logic Operation Based Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 190-203, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Vipul Goyal |
Secure Composition of Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 71, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Puneet Gupta, Scott D. Stoller, Zhongyuan Xu |
Abductive Analysis of Administrative Policies in Rule-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 116-130, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ram Krishnan, Ravi S. Sandhu |
Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 102-115, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg 0001, Limin Jia 0001, Dilsun Kirli Kaynar, Arunesh Sinha |
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 1-27, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mathieu Jaume, Valérie Viet Triem Tong, Ludovic Mé |
Flow Based Interpretation of Access Control: Detection of Illegal Information Flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 72-86, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Atanu Basu, Indranil Sengupta 0001, Jamuna Kanta Sing |
Secured Cloud Storage Scheme Using ECC Based Key Management in User Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 175-189, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Federico Maggi, Andrea Bellini, Guido Salvaneschi, Stefano Zanero |
Finding Non-trivial Malware Naming Inconsistencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 144-159, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Indivar Gupta, P. K. Saxena |
Distributed Signcryption from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 215-234, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ravi Shankar Yadav, Praveen Likhar, M. Keshava Rao |
SecWEM: A Security Solution for Web Based E-mail. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 309-321, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Faraz Ahmed, M. Zubair Rafique, Muhammad Abulaish |
A Data Mining Framework for Securing 3G Core Network from GTP Fuzzing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 280-293, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ping Chen 0003, Xiao Xing, Hao Han, Bing Mao, Li Xie 0001 |
Efficient Detection of the Return-Oriented Programming Malicious Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 140-155, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Moritz Y. Becker, Alexander Malkis, Laurent Bussard |
A Practical Generic Privacy Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 125-139, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ravi Kumar 0005, Shamik Sural, Arobinda Gupta |
Mining RBAC Roles under Cardinality Constraint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 171-185, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | V. N. Venkatakrishnan, Prithvi Bisht, Mike Ter Louw, Michelle Zhou 0002, Kalpana Gondi, Karthik Thotta Ganesh |
WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 3-26, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Andrew C. Myers |
Toward Securely Programming the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 27, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shaoying Cai, Chunhua Su, Yingjiu Li, Robert H. Deng, Tieyan Li |
Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 246-260, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, Frank Piessens |
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 156-170, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fathieh Faghih, Morteza Amini, Rasool Jalili |
Specification of History Based Constraints for Access Control in Conceptual Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 186-200, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michelle Zhou 0002, Prithvi Bisht, V. N. Venkatakrishnan |
Strengthening XSRF Defenses for Legacy Web Applications Using Whitebox Analysis and Transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 96-110, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jonathon T. Giffin, Abhinav Srivastava |
Attribution of Malicious Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 28-47, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wei Wang 0012, Xiangliang Zhang 0001, Georgios Pitsilis |
Abstracting Audit Data for Lightweight Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 201-215, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Raju Halder, Agostino Cortesi |
A Persistent Public Watermarking of Relational Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 216-230, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mridul Nandi, Stefan Popoveniuc, Poorvi L. Vora |
Stamp-It: A Method for Enhancing the Universal Verifiability of E2E Voting Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 81-95, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mathieu Jaume |
Security Rules versus Security Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 231-245, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Thanh-Binh Dao, Etsuya Shibayama |
Coverage Criteria for Automatic Security Testing of Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 111-124, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sriram K. Rajamani |
Analyzing Explicit Information Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 1-2, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Arnar Birgisson, Alejandro Russo, Andrei Sabelfeld |
Unifying Facets of Information Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 48-65, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Somesh Jha, Anish Mathuria (eds.) |
Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![Springer, 978-3-642-17713-2 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Raghunathan Srinivasan, Partha Dasgupta, Tushar Gohad, Amiya Bhattacharya |
Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings, pp. 66-80, 2010, Springer, 978-3-642-17713-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Gaurav Gupta 0002, Josef Pieprzyk |
Database Relation Watermarking Resilient against Secondary Watermarking Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 222-236, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sukriti Bhattacharya, Agostino Cortesi |
A Generic Distortion Free Watermarking Technique for Relational Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 252-264, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Database Watermarking, Abstract Interpretation, Galois Connection, HMAC |
1 | Marc Dacier, Van-Hau Pham, Olivier Thonnard |
The WOMBAT Attack Attribution Method: Some Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 19-37, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shrikant Ojha, Naveen Kumar 0001, Kritika Jain, Sangeeta Lal |
TWIS - A Lightweight Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 280-291, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
S-Box, Cipher, lightweight cryptography, CLEFIA |
1 | Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis |
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 193-207, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez |
On Some Weaknesses in the Disk Encryption Schemes EME and EME2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 265-279, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Tweakable Enciphering Schemes, Disc Encryption, EME, Modes of operation |
1 | Ravi Mukkamala, Vishnu Kamisetty, Pawankumar Yedugani |
Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 318-325, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
failed accesses, Access control, role-based access control, role mining, misconfigurations |
1 | Nagaraja Kaushik Gampa, Rohit Ashok Khot, Kannan Srinathan |
Let Only the Right One IN: Privacy Management Scheme for Social Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 310-317, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy over social networks, preference based authentication, friend verification, challenge response schemes |
1 | Matt Smart, Eike Ritter |
Remote Electronic Voting with Revocable Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 39-54, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Indranil Saha, Debapriyay Mukhopadhyay |
Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 292-300, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|