The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICISS"( http://dblp.L3S.de/Venues/ICISS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/iciss

Publication years (Num. hits)
2005 (29) 2006 (33) 2007 (28) 2008 (26) 2009 (26) 2010 (19) 2011 (29) 2012 (25) 2013 (30) 2014 (28) 2015 (37) 2016 (33) 2017 (26) 2018 (25) 2019 (19) 2020 (59) 2021 (43) 2022 (46) 2023 (71)
Publication types (Num. hits)
inproceedings(609) proceedings(23)
Venues (Conferences, Journals, ...)
ICISS(632)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 150 occurrences of 130 keywords

Results
Found 632 publication records. Showing 632 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Venu Govindaraju Biometrics and Security. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ping Chen 0003, Hai Xiao, Xiaobin Shen 0001, Xinchun Yin, Bing Mao, Li Xie 0001 DROP: Detecting Return-Oriented Programming Malicious Code. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Atul Prakash 0001, Indranil Gupta (eds.) Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Angelos D. Keromytis A Survey of Voice over IP Security Research. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Massimiliano Masi, Rosario Pugliese, Francesco Tiezzi 0001 On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nataraj Nagaratnam Security for a Smarter Planet. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jeff Zarnett, Patrick Lam 0001, Mahesh V. Tripunitara Method-Specific Java Access Control via RMI Proxy Objects Using Annotations. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jonathan White, Brajendra Panda Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ge Fu, Hong Zhu 0003, Yingjiu Li A Robust Damage Assessment Model for Corrupted Database Systems. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Data integrity, database recovery, damage assessment
1Padmalochan Bera, Soumya Kanti Ghosh 0001, Pallab Dasgupta Formal Verification of Security Policy Implementations in Enterprise Networks. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access control list (ACL), Formal Verification, Network security, Security Policy
1Zhiyao Liang, Rakesh M. Verma Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF insecurity, Cryptographic protocols, secrecy, NP
1Zhen Zhang, K. H. (Kane) Kim, Myeong-Ho Kang, Tianran Zhou, Byung-Ho Chung, Shin-Hyo Kim, Seok-Joon Lee An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF payment gateway, Anonymous, encryption, mix, purchasing, e-cash, information product
1Michael Adjedj, Julien Bringer, Hervé Chabanne, Bruno Kindarji Biometric Identification over Encrypted Data Made Feasible. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Biometrics, Identification, Searchable Encryption
1Michael K. Reiter, Vyas Sekar, Chad Spensky, Zhenghao Zhang Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi A Framework for Behavior-Based Malware Analysis in the Cloud. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert H. Deng On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy, Authentication, RFID, Anonymous
1Duc-Phong Le, Alexis Bonnecaze, Alban Gabillon A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper). Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Timestamping scheme, Chameleon hash function, Absolute timestamp, Merkle tree
1Luca Foschini 0002, Ashish V. Thapliyal, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna A Parallel Architecture for Stateful, High-Speed Intrusion Detection. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Frédéric Cuppens, Nora Cuppens-Boulahia, Julien A. Thomas A Robust Reputation Scheme for Decentralized Group Management Systems. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ludwig Fuchs, Günther Pernul HyDRo - Hybrid Development of Roles. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Role Development Methodology, Information security, Identity Management, Role Engineering, Role Mining
1Lukasz Nitschke Secure Internet Voting Based on Paper Ballots. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Patrick Düssel, Christian Gehl, Pavel Laskov, Konrad Rieck Incorporation of Application Layer Protocol Syntax into Anomaly Detection. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anomaly Detection, Web Security, Protocol Analysis
1Enkh-Amgalan Baatarjav, Ram Dantu, Santi Phithakkitnukoon Privacy Management for Facebook. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privacy, Social network, Facebook, Privacy management
1Gianni Tedesco, Uwe Aickelin Real-Time Alert Correlation with Type Graphs. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Dave King 0002, Boniface Hicks, Michael Hicks 0001, Trent Jaeger Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Umarani Jayaraman, Surya Prakash 0001, Phalguni Gupta Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF feature level fusion, multi-dimensional data structure, indexing, Kd-tree
1Neelam Verma, Prasanna R. Mishra, Gireesh Pandey Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF PRBG, BBS generator, Geffe generator, Confidence Interval Estimation, Feature extraction, Multidimensional Scaling
1Devesh C. Jinwala, Dhiren R. Patel, Kankar S. Dasgupta Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Authentication, Encryption, Block Ciphers, Link Layer Security
1R. Sekar 0001, Arun K. Pujari (eds.) Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Manik Lal Das, Ravi Mukkamala Revisiting Bluetooth Security (Short Paper). Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Bluetooth security, Privacy, Authentication, Wireless communications, Bluetooth technology
1Craig S. Wright, Dave Kleiman, Shyaam Sundhar R. S. Overwriting Hard Drive Data: The Great Wiping Controversy. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Data Wipe, Secure Wipe, Digital Forensics, Format
1N. R. Sunitha, B. B. Amberker Proxy Re-signature Schemes. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Signature conversion, Proxy re-signature, Proxy revocation, Proxy key, Proxy Signature
1Vivekananda Bhat K., Indranil Sengupta 0001, Abhijit Das 0004 Audio Watermarking Based on Quantization in Wavelet Domain. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF discrete wavelet transform (DWT), quantization, Audio watermarking
1Dawn Xiaodong Song, David Brumley, Heng Yin 0001, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena BitBlaze: A New Approach to Computer Security via Binary Analysis. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malware analysis and defense, vulnerability analysis and defense, reverse engineering, Binary analysis
1Sasikanth Avancha A Framework for Trustworthy Service-Oriented Computing (Short Paper). Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Zhiyao Liang, Rakesh M. Verma Complexity of Checking Freshness of Cryptographic Protocols. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Athena, NP-completeness, Cryptographic protocols, undecidability, replay attack, model checker, freshness, challenge response
1Randy Smith, Cristian Estan, Somesh Jha, Ida Sri Rejeki Siahaan Fast Signature Matching Using Extended Finite Automaton (XFA). Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Amit Sahai Computing on Encrypted Data. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Deepak D'Souza, Raveendra Holla, Janardhan Kulkarni, Raghavendra K. Ramesh, Barbara Sprick On the Decidability of Model-Checking Information Flow Properties. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Basant Rajan The Enlightened Era of Enterprise Security (Invited Talk). Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Samrat Mondal, Shamik Sural A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper). Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Temporal RBAC, Model Checking, Verification, Timed Automata, CTL
1Anjali Sardana, Ramesh Chandra Joshi Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Pierangela Samarati Data Privacy - Problems and Solutions. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jun Li 0001, Dejing Dou, Shiwoong Kim, Han Qin, Yibo Wang On Knowledge-Based Classification of Abnormal BGP Events. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1G. K. Patra, V. Anil Kumar, R. P. Thangavelu Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Chaotic Synchronization, Chaotic cryptosystems, Super-positioned signal, Stream ciphers
1Gaurav Gupta, R. Sultania, Sounak Mondal, Sanjoy Kumar Saha 0001, Bhabatosh Chanda A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF fake document, printer detection, scanner detection, digital forensic
1Ashish Kumar Singh, Priya Chandran A Secure and Efficient Multi-authority Proactive Election Scheme. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Rakeshbabu Bobba, Himanshu Khurana DLPKH - Distributed Logical Public-Key Hierarchy. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF decentralized key distribution, logical key hierarchy, public-key trees, key agreement, Group key management
1Atul Prakash 0001 Security in Practice - Security-Usability Chasm. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Debojyoti Bhattacharya, Nitin Bansal, Amitava Banerjee, Dipanwita Roy Chowdhury A Near Optimal S-Box Design. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cellular Automata, Algebraic Attack, S-box, Power Attack
1Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje Secure Transaction Management Protocols for MLS/DDBMS. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF concurrency control, covert channel, Multilevel security, distributed database system, commit protocol
1K. B. Raja, Kiran Kumar K., Satish Kumar N., M. S. Lakshmi, H. Preeti, K. R. Venugopal 0001, Lalit M. Patnaik Genetic Algorithm Based Steganography Using Wavelets. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Patrick D. McDaniel, Shyam K. Gupta 0001 (eds.) Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Zhiyong Shan, Qiuyue Wang, Xiaofeng Meng 0001 An OS Security Protection Model for Defeating Attacks from Network. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Access Control, information flow
1Meng-Hui Lim, Sanggon Lee, Sang-Jae Moon Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Anshuman Saxena, Marc Lacoste, Tahar Jarboui, Ulf Lücking, Bernd Steinke A Software Framework for Autonomic Security in Pervasive Environments. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kotagiri Ramamohanarao, Kapil Kumar Gupta, Tao Peng 0002, Christopher Leckie The Curse of Ease of Access to the Internet. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ramanarayana Kandikattu, Lillykutty Jacob A Secure Intra-domain Routing Protocol for Wireless Mesh Networks. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Subrat Kumar Dash, Sanjay Rawat 0001, Arun K. Pujari Use of Dimensionality Reduction for Intrusion Detection. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Host Based IDS, Data Mining, Dimensionality Reduction, System Calls, Locally Linear Embedding
1Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Jun Li 0001 Investigating the Impact of Real-World Factors on Internet Worm Propagation. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Dhananjay Bapat, Kevin R. B. Butler, Patrick D. McDaniel Towards Automated Privilege Separation. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Debasis Giri, Parmeshwary Dayal Srivastava Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Smart card, Attack, Timestamp, Nonce
1Joachim Biskup, Dominique Marc Burgard, Torben Weibert, Lena Wiese Inference Control in Logic Databases as a Constraint Satisfaction Problem. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF confidentiality, constraint satisfaction problems, Inference control, constraint hierarchies, logic databases
1Hidema Tanaka Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Electromagnetic emanation, EMC, Side-channel attack, Eavesdropping, Tempest
1Christophe Clavier An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF GSM Authentication, A3/A8, Substitution Table, Reverse Engineering, Side Channel Analysis
1Shimon K. Modi, Stephen J. Elliott, Hakil Kim Performance Analysis for Multi Sensor Fingerprint Recognition System. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1K. Sivakumar, K. Garg Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration (CXE)" Using CWE and CVE. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure code, PHP Vulnerabilities, CWE, CVE, Web Security, XSS
1G. K. Patra, V. Anil Kumar, R. P. Thangavelu A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Key Agreement Algorithms, Chaotic Synchronization, Parameter Estimation
1Hossein Ghodosi An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Indrakshi Ray, Mahendra Kumar, Lijun Yu LRBAC: A Location-Aware Role-Based Access Control Model. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Vartika Singh, D. R. Lakshminarasimhaiah, Yogesh Mishra, Chitra Viswanathan, G. Athithan 0001 An Implementation and Evaluation of Online Disk Encryption for Windows Systems. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Disk encryption, Initialization vector, Storage data encryption/decryption and Sector-level encryption, Storage security
1Shyam K. Gupta 0001, Vikram Goyal, Bholi Patra, Sankalp Dubey, Anand Gupta Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report). Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1L. Chaithanya, M. P. Singh, M. M. Gore Secure Data Management in Reactive Sensor Networks. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Shyam K. Gupta 0001, Vikram Goyal, Anand Gupta Malafide Intension Based Detection of Privacy Violation in Information System. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Praveen Kumar Vadnala, Anish Mathuria An Efficient Key Assignment Scheme for Access Control in a Hierarchy. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Rajwinder Singh, Navdeep Kaur, Anil Kumar Sarje Secure Itineraries Framework for Mobile Agent Systems. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF serial itinerary, parallel itinerary, mobile agent security, Itineraries
1Kevin R. B. Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick D. McDaniel Privacy Preserving Web-Based Email. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Purificación Sáiz, Jon Matías, Eduardo Jacob, Javier Bustamante, Armando Astarloa Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Frédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma O2O: Virtual Private Organizations to Manage Security Policy Interoperability. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Virtual Private Organization (VPO), Role Single Sign On (RSSO), Authority spheres, Access Control, Interoperability, Virtual Organization (VO), OrBAC
1Anirban Majumdar 0001, Clark D. Thomborson, Stephen Drape A Survey of Control-Flow Obfuscations. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Trent Jaeger Password Exhaustion: Predicting the End of Password Usefulness. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Haibing Lu, Yingjiu Li, Xintao Wu Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract). Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mounita Saha, Dipanwita Roy Chowdhury Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Anirban Sengupta, Mridul Sankar Barik Towards a Formal Specification Method for Enterprise Information System Security. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee, Heejo Lee Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1N. V. Narendra Kumar, R. K. Shyamasundar Specification and Realization of Access Control in SPKI/SDSI. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Vipin Swarup, Len Seligman, Arnon Rosenthal A Data Sharing Agreement Framework. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Krishna Sandeep Reddy Dubba, Subrat Kumar Dash, Arun K. Pujari New Malicious Code Detection Using Variable Length n-grams. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Episodes, Data Mining, n-grams, Malicious code detection
1Hyeran Lee, Kyung Hyune Rhee High Capacity Lossless Data Hiding. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Re- storation, Authentication, Watermarking, Lossless Data Hiding, High Capacity
1Y. V. Subba Rao, Abhijit Mitra, S. R. Mahadeva Prasanna A Partial Image Encryption Method with Pseudo Random Sequences. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Partial encryption, Residual intelligence, Pseudo random sequence
1Wanyu Zang, Meng Yu 0001 A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attack recovery, distributed systems, transactional processes, self-healing
1Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl Security Ontology: Simulating Threats to Corporate Assets. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF risk analysis, threat modeling, security ontology
1Amirreza Masoumzadeh 0001, Morteza Amini, Rasool Jalili Context-Aware Provisional Access Control. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Alex Gurevich, Ehud Gudes Recent Research on Privacy Preserving Data Mining. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Amlan Kundu 0002, Shamik Sural, Arun K. Majumdar Two-Stage Credit Card Fraud Detection Using Sequence Alignment. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Aditya Bagchi, Vijayalakshmi Atluri (eds.) Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Pierangela Samarati Privacy in the Electronic Society. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Joachim Biskup, Joerg Parthe Optimistic Anonymous Participation in Inter-organizational Workflow Instances. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 632 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license