11th ICISS 2015: Kolkata, India

Invited Talks

Access Control

Attacks and Mitigation

Cloud Security

Crypto Systems and Protocols

Information Flow Control

Sensor Networks and Cognitive Radio

Watermarking and Steganography

Short Papers

a service of Schloss Dagstuhl - Leibniz Center for Informatics