The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICISS"( http://dblp.L3S.de/Venues/ICISS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/iciss

Publication years (Num. hits)
2005 (29) 2006 (33) 2007 (28) 2008 (26) 2009 (26) 2010 (19) 2011 (29) 2012 (25) 2013 (30) 2014 (28) 2015 (37) 2016 (33) 2017 (26) 2018 (25) 2019 (19) 2020 (59) 2021 (43) 2022 (46) 2023 (71)
Publication types (Num. hits)
inproceedings(609) proceedings(23)
Venues (Conferences, Journals, ...)
ICISS(632)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 150 occurrences of 130 keywords

Results
Found 632 publication records. Showing 632 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati Extending Context Descriptions in Semantics-Aware Access Control. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje Fairness Strategy for Multilevel Secure Concurrency Control Protocol. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF concurrency control, fairness, covert channel, Multilevel secure database systems
1Kulesh Shanmugasundaram, Nasir D. Memon Network Monitoring for Security and Forensics. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network Security, Network Monitoring, Network Forensics, Synopses
1JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Mediated identity-based encryption, Identity revocation, Mediated key agreement protocol, Key escrow
1Sushil Jajodia, Chandan Mazumdar (eds.) Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sharmistha Bagchi-Sen, JinKyu Lee 0003, H. Raghav Rao, Shambhu J. Upadhyaya A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field . Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1V. Radha 0001, N. Hemanth Kumar EISA - An Enterprise Application Security Solution for Databases. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jian Wang 0038, Lein Harn, Hideki Imai Key Management for Multicast Fingerprinting. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Subrat Kumar Dash, Krupa Sagar Reddy, Arun K. Pujari Episode Based Masquerade Detection. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Vishal Vatsa, Shamik Sural, Arun K. Majumdar A Game-Theoretic Approach to Credit Card Fraud Detection. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Anirban Sengupta, Aniruddha Mukhopadhyay, Koel Ray, Aveek Guha Roy, Dipankar Aich, Mridul Sankar Barik, Chandan Mazumdar A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security . Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ashok Kumar Das A Key Reshuffling Scheme for Wireless Sensor Networks. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Vivek Ramachandran, Sukumar Nandi Detecting ARP Spoofing: An Active Technique. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Roshni Chatterjee, Moiz A. Saifee, Dipanwita Roy Chowdhury Modifications of SHA-0 to Prevent Attacks. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mahalingam Ramkumar On Broadcast Encryption with Random Key Pre-distribution Schemes. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Debdeep Mukhopadhyay, Abhishek Chaudhary, Arvind Nebhnani, Dipanwita Roy Chowdhury CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Random Merging, Sensor Network, Key Pre-distribution, Combinatorial Design
1Indrakshi Ray, Wei Huang Event Detection in Multilevel Secure Active Databases. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Vijay Varadharajan Authorization and Trust Enhanced Security for Distributed Applications. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans Protection of Relationships in XML Documents with the XML-BB Model. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Prem Chand Building India as the Destination for Secure Software Development - Next Wave of Opportunities for the ICT Industry. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Bruce Christianson, Partha Das Chowdhury, James A. Malcolm Auditable Anonymous Delegation. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ernesto Damiani, Marco Anisetti, Valerio Bellandi Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1N. Subramanian, Pramod S. Pawar, Mayank Bhatnagar, Nihar S. Khedekar, Srinivas Guntupalli, N. Satyanarayana, V. K. Vijaykumar, Praveen D. Ampatt, Rajiv Ranjan, Prasad J. Pandit Development of a Comprehensive Intrusion Detection System - Challenges and Approaches. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Challenges in IDS, IDS Architecture, IDS Standards
1Weiliang Zhao, Vijay Varadharajan, George Bryan Analysis and Modelling of Trust in Distributed Information Systems. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Shince Thomas, Devesh Misra, P. R. Lakshmi Eswari, N. Sarat Chandra Babu A Transparent End-to-End Security Solution. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Kevin R. B. Butler, Patrick D. McDaniel Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Indrajit Ray, Sudip Chakraborty, Indrakshi Ray VTrust: A Trust Management System Based on a Vector Model of Trust. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1JungHoon Ha, Jianying Zhou 0001, Sang-Jae Moon A Robust Double Auction Protocol Based on a Hybrid Trust Model. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jaydev Mishra, Pinakpani Pal, Aditya Bagchi SPEAR: Design of a Secured Peer-to-Peer Architecture . Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jaijit Bhattacharya, S. K. Gupta 0001 EPAL Based Privacy Enforcement Using ECA Rules. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #632 of 632 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license