


default search action
4th ICISS 2008: Hyderabad, India
- R. Sekar, Arun K. Pujari:

Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings. Lecture Notes in Computer Science 5352, Springer 2008, ISBN 978-3-540-89861-0
Keynote Address
- Dawn Xiaodong Song, David Brumley

, Heng Yin
, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang
, James Newsome, Pongsin Poosankam, Prateek Saxena:
BitBlaze: A New Approach to Computer Security via Binary Analysis. 1-25
Languages and Formal Methods
- Deepak D'Souza, Raveendra Holla, Janardhan Kulkarni, Raghavendra K. Ramesh, Barbara Sprick:

On the Decidability of Model-Checking Information Flow Properties. 26-40 - Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier:

Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties. 41-55 - Dave King, Boniface Hicks, Michael Hicks

, Trent Jaeger:
Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. 56-70
Protocols
- Frédéric Cuppens, Nora Cuppens-Boulahia, Julien A. Thomas:

A Robust Reputation Scheme for Decentralized Group Management Systems. 71-85 - Zhiyao Liang, Rakesh M. Verma

:
Complexity of Checking Freshness of Cryptographic Protocols. 86-101 - Lukasz Nitschke:

Secure Internet Voting Based on Paper Ballots. 102-115
Short Papers
- Duc-Phong Le

, Alexis Bonnecaze, Alban Gabillon:
A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper). 116-123 - Sasikanth Avancha:

A Framework for Trustworthy Service-Oriented Computing (Short Paper). 124-131 - Manik Lal Das, Ravi Mukkamala:

Revisiting Bluetooth Security (Short Paper). 132-139 - Samrat Mondal

, Shamik Sural
:
A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper). 140-147
Keynote Address
- Amit Sahai:

Computing on Encrypted Data. 148-153
Ongoing Research
- Neelam Verma, Prasanna Raghaw Mishra, Gireesh Pandey:

Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators. 154-155 - N. R. Sunitha

, B. B. Amberker:
Proxy Re-signature Schemes. 156-157
Keynote Address
- Randy Smith, Cristian Estan, Somesh Jha, Ida Sri Rejeki Siahaan

:
Fast Signature Matching Using Extended Finite Automaton (XFA). 158-172
Intrusion Detection
- Gianni Tedesco, Uwe Aickelin

:
Real-Time Alert Correlation with Type Graphs. 173-187 - Patrick Düssel, Christian Gehl, Pavel Laskov, Konrad Rieck:

Incorporation of Application Layer Protocol Syntax into Anomaly Detection. 188-202 - Luca Foschini, Ashish V. Thapliyal

, Lorenzo Cavallaro
, Christopher Kruegel, Giovanni Vigna:
A Parallel Architecture for Stateful, High-Speed Intrusion Detection. 203-220
Biometrics, Forensics and Steganography
- Umarani Jayaraman

, Surya Prakash
, Phalguni Gupta:
Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion. 221-234 - Vivekananda Bhat K.

, Indranil Sengupta, Abhijit Das:
Audio Watermarking Based on Quantization in Wavelet Domain. 235-242 - Craig S. Wright, Dave Kleiman, Shyaam Sundhar R. S.:

Overwriting Hard Drive Data: The Great Wiping Controversy. 243-257
Practical Applications
- Devesh C. Jinwala

, Dhiren R. Patel, Kankar S. Dasgupta:
Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks. 258-272 - Enkh-Amgalan Baatarjav, Ram Dantu, Santi Phithakkitnukoon

:
Privacy Management for Facebook. 273-286 - Ludwig Fuchs, Günther Pernul:

HyDRo - Hybrid Development of Roles. 287-302
Keynote Address
- Basant Rajan:

The Enlightened Era of Enterprise Security (Invited Talk). 303-305

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














