The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICISS"( http://dblp.L3S.de/Venues/ICISS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/iciss

Publication years (Num. hits)
2005 (29) 2006 (33) 2007 (28) 2008 (26) 2009 (26) 2010 (19) 2011 (29) 2012 (25) 2013 (30) 2014 (28) 2015 (37) 2016 (33) 2017 (26) 2018 (25) 2019 (19) 2020 (59) 2021 (43) 2022 (46) 2023 (71)
Publication types (Num. hits)
inproceedings(609) proceedings(23)
Venues (Conferences, Journals, ...)
ICISS(632)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 150 occurrences of 130 keywords

Results
Found 632 publication records. Showing 632 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Ganugula Umadevi, Ashutosh Saxena Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Naveen Kumar 0011, Anish Mathuria, Manik Lal Das Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme - (Short Paper). Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mathieu Jaume, Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong, Ludovic Mé Secure States versus Secure Executions - From Access Control to Flow Control. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aditya Bagchi, Indrakshi Ray (eds.) Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David Lorenzi, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri Web Services Based Attacks against Image CAPTCHAs. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nabanita Mukherjee, Ayon Bhattacharya, Siddhartha Sekhar Bose Evolutionary Multibit Grouping Steganographic Algorithm. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri, Stephane Morucci Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Samiran Bag, Sushmita Ruj, Bimal K. Roy Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chris Clifton, Balamurugan Anandan Challenges and Opportunities for Security with Differential Privacy. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Manisha Sharma, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya An Administrative Model for Spatio-Temporal Role Based Access Control. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Beng Heng Ng, Atul Prakash 0001 Let the Right One in: Discovering and Mitigating Permission Gaps. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kerim Yasin Oktay, Vaibhav Khadilkar, Murat Kantarcioglu, Sharad Mehrotra Risk Aware Approach to Data Confidentiality in Cloud Computing. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Imon Mukherjee, Goutam Paul 0001 Efficient Multi-bit Image Steganography in Spatial Domain. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Santanu Sarkar 0001, Sourav Sen Gupta 0001, Subhamoy Maitra Error Correction of Partially Exposed RSA Private Keys from MSB Side. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa Information Theoretical Analysis of Side-Channel Attack. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Soumyadev Maity, Ramesh C. Hansdah A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Soumyadev Maity, Ramesh C. Hansdah Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chaitrali Amrutkar, Kapil Singh, Arunabh Verma, Patrick Traynor VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jaydeep Howlader, Jayanta Kar, Ashis Kumar Mal Coercion Resistant MIX for Electronic Auction. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christopher Kruegel Fighting Malicious Software. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Matthew L. Bolton, Celeste M. Wallace, Lenore D. Zuck On Policies and Intents. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Y. Sreenivasa Rao, Ratna Dutta Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu Risk-Aware RBAC Sessions. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Andres Ojamaa, Karl Düüna Security Assessment of Node.js Platform. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Girish Chandra, Divakar Yadav Verification of Money Atomicity in Digital Cash Based Payment System. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Doaa Hassan Tracking Insecure Information Flows: A Prototype Evaluator in ASF+SDF. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Rakesh Matam, Somanath Tripathy Defence against Wormhole Attacks in Wireless Mesh Networks. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Arne Swinnen, Raoul Strackx, Pieter Philippaerts, Frank Piessens ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Anup Kumar Bhattacharya, Abhijit Das 0004, Dipanwita Roy Chowdhury, Aravind Iyer, Debojyoti Bhattacharya Autonomous Certification with List-Based Revocation for Secure V2V Communication. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vivek Natarajan, Yi Yang 0002, Sencun Zhu Secure Trust Metadata Management for Mobile Ad-Hoc Networks. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Weihan Li, Brajendra Panda, Qussai Yaseen Mitigating Insider Threat on Database Integrity. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Soumya Maity, Soumya Kanti Ghosh 0001 A Cognitive Trust Model for Access Control Framework in MANET. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Prasad Naldurg Foundations of Dynamic Access Control. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alberto Peinado, Amparo Fúster-Sabater Cryptographic Analysis of a Type of Sequence Generators. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Simin Ghasemi, Morteza Noferesti, Mohammad Ali Hadavi, Sadegh Dorri Nogoorani, Rasool Jalili Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Venkat N. Venkatakrishnan, Diganta Goswami (eds.) Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Khalifa Toumi, César Andrés, Ana R. Cavalli Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1David Lorenzi, Jaideep Vaidya, Emre Uzun, Shamik Sural, Vijayalakshmi Atluri Attacking Image Based CAPTCHAs Using Image Recognition Techniques. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Goutam Paul 0001, Ian Davidson, Imon Mukherjee, S. S. Ravi Keyless Steganography in Spatial Domain Using Energetic Pixels. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ruchira Naskar, Rajat Subhra Chakraborty Fuzzy Inference Rule Based Reversible Watermarking for Digital Images. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sarita Agrawal, Rodrigo Roman, Manik Lal Das, Anish Mathuria, Javier López 0001 A Novel Key Update Protocol in Mobile Sensor Networks. Search on Bibsonomy ICISS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips Towards Detection of Botnet Communication through Social Media by Monitoring User Activity. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sushil Jajodia, Chandan Mazumdar (eds.) Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Anuj Shanker Saxena, Mayank Pundir, Vikram Goyal, Debajyoti Bera Preserving Location Privacy for Continuous Queries on Known Route. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Prithu Banerjee, Mahasweta Mitra, Ferdous A. Barbhuiya, Sandip Chakraborty, Sukumar Nandi An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Filippo Del Tedesco, Sebastian Hunt, David Sands 0001 A Semantic Hierarchy for Erasure Policies. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tanusha S. Nadkarni, Radhesh Mohandas, Alwyn R. Pais IFrandbox - Client Side Protection from Malicious Injected Iframes. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Meilof Veeningen, Benne de Weger, Nicola Zannone Formal Privacy Analysis of Communication Protocols for Identity Management. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Julien A. Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia Consistency Policies for Dynamic Information Systems with Declassification Flows. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1William Enck Defending Users against Smartphone Apps: Techniques and Future Directions. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Apurba Das, Subhamoy Maitra, Goutam Paul 0001, Santanu Sarkar 0001 Some Combinatorial Results towards State Recovery Attack on RC4. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yan Huang 0001, Chih-Hao Shen, David Evans 0001, Jonathan Katz, Abhi Shelat Efficient Secure Computation with Garbled Circuits. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dimitris Geneiatakis, Georgios Portokalidis, Angelos D. Keromytis A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Olga Gadyatskaya, Eduardo Lostal, Fabio Massacci Load Time Security Verification. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Morteza Noferesti, Mohammad Ali Hadavi, Rasool Jalili A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Harini Ragavan, Brajendra Panda Mitigation of Malicious Modifications by Insiders in Databases. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Christian A. Schneider, Jonas Pfoh, Claudia Eckert 0001 A Universal Semantic Bridge for Virtual Machine Introspection. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Winfried E. Kühnhauser, Anja Pölck Towards Access Control Model Engineering. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lorenzo Cavallaro, R. Sekar 0001 Taint-Enhanced Anomaly Detection. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ruchira Naskar, Rajat Subhra Chakraborty Reversible Image Watermarking through Coordinate Logic Operation Based Prediction. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Vipul Goyal Secure Composition of Cryptographic Protocols. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Puneet Gupta, Scott D. Stoller, Zhongyuan Xu Abductive Analysis of Administrative Policies in Rule-Based Access Control. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ram Krishnan, Ravi S. Sandhu Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg 0001, Limin Jia 0001, Dilsun Kirli Kaynar, Arunesh Sinha Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mathieu Jaume, Valérie Viet Triem Tong, Ludovic Mé Flow Based Interpretation of Access Control: Detection of Illegal Information Flows. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Atanu Basu, Indranil Sengupta 0001, Jamuna Kanta Sing Secured Cloud Storage Scheme Using ECC Based Key Management in User Hierarchy. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Federico Maggi, Andrea Bellini, Guido Salvaneschi, Stefano Zanero Finding Non-trivial Malware Naming Inconsistencies. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Indivar Gupta, P. K. Saxena Distributed Signcryption from Pairings. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ravi Shankar Yadav, Praveen Likhar, M. Keshava Rao SecWEM: A Security Solution for Web Based E-mail. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Faraz Ahmed, M. Zubair Rafique, Muhammad Abulaish A Data Mining Framework for Securing 3G Core Network from GTP Fuzzing Attacks. Search on Bibsonomy ICISS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ping Chen 0003, Xiao Xing, Hao Han, Bing Mao, Li Xie 0001 Efficient Detection of the Return-Oriented Programming Malicious Code. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Moritz Y. Becker, Alexander Malkis, Laurent Bussard A Practical Generic Privacy Language. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ravi Kumar 0005, Shamik Sural, Arobinda Gupta Mining RBAC Roles under Cardinality Constraint. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1V. N. Venkatakrishnan, Prithvi Bisht, Mike Ter Louw, Michelle Zhou 0002, Kalpana Gondi, Karthik Thotta Ganesh WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper). Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Andrew C. Myers Toward Securely Programming the Internet. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shaoying Cai, Chunhua Su, Yingjiu Li, Robert H. Deng, Tieyan Li Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, Frank Piessens ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Fathieh Faghih, Morteza Amini, Rasool Jalili Specification of History Based Constraints for Access Control in Conceptual Level. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michelle Zhou 0002, Prithvi Bisht, V. N. Venkatakrishnan Strengthening XSRF Defenses for Legacy Web Applications Using Whitebox Analysis and Transformation. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jonathon T. Giffin, Abhinav Srivastava Attribution of Malicious Behavior. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Xiangliang Zhang 0001, Georgios Pitsilis Abstracting Audit Data for Lightweight Intrusion Detection. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Raju Halder, Agostino Cortesi A Persistent Public Watermarking of Relational Databases. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mridul Nandi, Stefan Popoveniuc, Poorvi L. Vora Stamp-It: A Method for Enhancing the Universal Verifiability of E2E Voting Systems. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mathieu Jaume Security Rules versus Security Properties. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Thanh-Binh Dao, Etsuya Shibayama Coverage Criteria for Automatic Security Testing of Web Applications. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sriram K. Rajamani Analyzing Explicit Information Flow. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Arnar Birgisson, Alejandro Russo, Andrei Sabelfeld Unifying Facets of Information Integrity. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Somesh Jha, Anish Mathuria (eds.) Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Raghunathan Srinivasan, Partha Dasgupta, Tushar Gohad, Amiya Bhattacharya Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote Attestation. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Gaurav Gupta 0002, Josef Pieprzyk Database Relation Watermarking Resilient against Secondary Watermarking Attacks. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sukriti Bhattacharya, Agostino Cortesi A Generic Distortion Free Watermarking Technique for Relational Databases. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Database Watermarking, Abstract Interpretation, Galois Connection, HMAC
1Marc Dacier, Van-Hau Pham, Olivier Thonnard The WOMBAT Attack Attribution Method: Some Results. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shrikant Ojha, Naveen Kumar 0001, Kritika Jain, Sangeeta Lal TWIS - A Lightweight Block Cipher. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF S-Box, Cipher, lightweight cryptography, CLEFIA
1Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez On Some Weaknesses in the Disk Encryption Schemes EME and EME2. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Tweakable Enciphering Schemes, Disc Encryption, EME, Modes of operation
1Ravi Mukkamala, Vishnu Kamisetty, Pawankumar Yedugani Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper). Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF failed accesses, Access control, role-based access control, role mining, misconfigurations
1Nagaraja Kaushik Gampa, Rohit Ashok Khot, Kannan Srinathan Let Only the Right One IN: Privacy Management Scheme for Social Network. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy over social networks, preference based authentication, friend verification, challenge response schemes
1Matt Smart, Eike Ritter Remote Electronic Voting with Revocable Anonymity. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Indranil Saha, Debapriyay Mukhopadhyay Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 632 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license