Search dblp for Publications

export results for "stream:streams/conf/iciss:"

 download as .bib file

@inproceedings{DBLP:conf/iciss/AcharyaPT19,
  author    = {Anasuya Acharya and
               Manoj Prabhakaran and
               Akash Trehan},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {An Introduction to the CellTree Paradigm (Invited Paper)},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {137--153},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_8},
  doi       = {10.1007/978-3-030-36945-3\_8},
  timestamp = {Thu, 12 Dec 2019 16:01:19 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/AcharyaPT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BatraAVS19,
  author    = {Gunjan Batra and
               Vijayalakshmi Atluri and
               Jaideep Vaidya and
               Shamik Sural},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {Policy Reconciliation and Migration in Attribute Based Access Control},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {99--120},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_6},
  doi       = {10.1007/978-3-030-36945-3\_6},
  timestamp = {Thu, 12 Dec 2019 16:01:19 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/BatraAVS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BopcheRRM19,
  author    = {Ghanshyam S. Bopche and
               Gopal N. Rai and
               B. Ramchandra Reddy and
               Babu M. Mehtre},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {Differential Attack Graph-Based Approach for Assessing Change in the
               Network Attack Surface},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {324--344},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_18},
  doi       = {10.1007/978-3-030-36945-3\_18},
  timestamp = {Thu, 19 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/BopcheRRM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DalaiP19,
  author    = {Deepak Kumar Dalai and
               Santu Pal},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {Wip: Degree Evaluation of Grain-v1},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {239--251},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_13},
  doi       = {10.1007/978-3-030-36945-3\_13},
  timestamp = {Thu, 12 Dec 2019 16:01:19 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/DalaiP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DasSVAR19,
  author    = {Saptarshi Das and
               Shamik Sural and
               Jaideep Vaidya and
               Vijayalakshmi Atluri and
               Gerhard Rigoll},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {VisMAP: Visual Mining of Attribute-Based Access Control Policies},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {79--98},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_5},
  doi       = {10.1007/978-3-030-36945-3\_5},
  timestamp = {Thu, 12 Dec 2019 16:01:19 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/DasSVAR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DubeyRSM19,
  author    = {Aditya Dubey and
               Uttara Ravi and
               Somya Sharma and
               Barsha Mitra},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {Toward Implementing Spatio-Temporal {RBAC} Extensions},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {59--78},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_4},
  doi       = {10.1007/978-3-030-36945-3\_4},
  timestamp = {Thu, 12 Dec 2019 16:01:19 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/DubeyRSM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/FatimaI19,
  author    = {Eram Fatima and
               Saiful Islam},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {A New High Capacity and Reversible Data Hiding Technique for Images},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {290--304},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_16},
  doi       = {10.1007/978-3-030-36945-3\_16},
  timestamp = {Thu, 19 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/FatimaI19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GangwarR19,
  author    = {Akhilesh Gangwar and
               Vadlamani Ravi},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {WiP: Generative Adversarial Network for Oversampling Data in Credit
               Card Fraud Detection},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {123--134},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_7},
  doi       = {10.1007/978-3-030-36945-3\_7},
  timestamp = {Thu, 19 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/GangwarR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HaglundG19,
  author    = {Jonas Haglund and
               Roberto Guanciale},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {Trustworthy Isolation of {DMA} Enabled Devices},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {35--55},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_3},
  doi       = {10.1007/978-3-030-36945-3\_3},
  timestamp = {Thu, 12 Dec 2019 16:01:19 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/HaglundG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HorandnerN19,
  author    = {Felix H{\"{o}}randner and
               Franco Nieddu},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound Keys},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {196--217},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_11},
  doi       = {10.1007/978-3-030-36945-3\_11},
  timestamp = {Thu, 12 Dec 2019 16:01:19 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/HorandnerN19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HorandnerRR19,
  author    = {Felix H{\"{o}}randner and
               Sebastian Ramacher and
               Simon Roth},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {Selective End-To-End Data-Sharing in the Cloud},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {175--195},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_10},
  doi       = {10.1007/978-3-030-36945-3\_10},
  timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/HorandnerRR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/JishaM19,
  author    = {T. E. Jisha and
               Thomas Monoth},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {WiP: Security Enhanced Size Invariant Visual Cryptography with Perfect
               Reconstruction of White Pixels},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {279--289},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_15},
  doi       = {10.1007/978-3-030-36945-3\_15},
  timestamp = {Thu, 12 Dec 2019 16:01:19 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/JishaM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KadhiwalaP19,
  author    = {Bintu Kadhiwala and
               Sankita J. Patel},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {A Novel k-Anonymization Approach to Prevent Insider Attack in Collaborative
               Social Network Data Publishing},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {255--275},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_14},
  doi       = {10.1007/978-3-030-36945-3\_14},
  timestamp = {Thu, 12 Dec 2019 16:01:19 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/KadhiwalaP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MandalD19,
  author    = {Arkaprava Bhaduri Mandal and
               Tanmoy Kanti Das},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {Anti-forensics of a {NAD-JPEG} Detection Scheme Using Estimation of
               {DC} Coefficients},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {307--323},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_17},
  doi       = {10.1007/978-3-030-36945-3\_17},
  timestamp = {Thu, 12 Dec 2019 16:01:19 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/MandalD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/NorooziSKI19,
  author    = {Ali A. Noroozi and
               Khayyam Salehi and
               Jaber Karimpour and
               Ayaz Isazadeh},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {Secure Information Flow Analysis Using the {PRISM} Model Checker},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {154--172},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_9},
  doi       = {10.1007/978-3-030-36945-3\_9},
  timestamp = {Thu, 12 Dec 2019 16:01:19 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/NorooziSKI19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PalLS19,
  author    = {Priyanka Pal and
               Sudharsana K. J. L. and
               Rohith Balaji S.},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {WiP: Criminal Smart Contract for Private Key Theft in End to End Encrypted
               Applications},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {21--32},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_2},
  doi       = {10.1007/978-3-030-36945-3\_2},
  timestamp = {Thu, 12 Dec 2019 16:01:19 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/PalLS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PalmaGVM19,
  author    = {Lucas M. Palma and
               Fernanda Oliveira Gomes and
               Mart{\'{\i}}n A. Gagliotti Vigil and
               Jean Everson Martina},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {A Transparent and Privacy-Aware Approach Using Smart Contracts for
               Car Insurance Reward Programs},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {3--20},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_1},
  doi       = {10.1007/978-3-030-36945-3\_1},
  timestamp = {Thu, 12 Dec 2019 16:01:19 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/PalmaGVM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/VermaMD19,
  author    = {Pranav Verma and
               Anish Mathuria and
               Sourish Dasgupta},
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {Item-Based Privacy-Preserving Recommender System with Offline Users
               and Reduced Trust Requirements},
  booktitle = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  pages     = {218--238},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3\_12},
  doi       = {10.1007/978-3-030-36945-3\_12},
  timestamp = {Thu, 12 Dec 2019 16:01:19 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/VermaMD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2019,
  editor    = {Deepak Garg and
               N. V. Narendra Kumar and
               Rudrapatna K. Shyamasundar},
  title     = {Information Systems Security - 15th International Conference, {ICISS}
               2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11952},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-36945-3},
  doi       = {10.1007/978-3-030-36945-3},
  isbn      = {978-3-030-36944-6},
  timestamp = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/2019.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/AdityaGL18,
  author    = {K. Aditya and
               Slawomir Grzonkowski and
               Nhien{-}An Le{-}Khac},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {RiskWriter: Predicting Cyber Risk of an Enterprise},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {88--106},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_5},
  doi       = {10.1007/978-3-030-05171-6\_5},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/AdityaGL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BakasN18,
  author    = {Jamimamul Bakas and
               Ruchira Naskar},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {A Digital Forensic Technique for Inter-Frame Video Forgery Detection
               Based on 3D {CNN}},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {304--317},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_16},
  doi       = {10.1007/978-3-030-05171-6\_16},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BakasN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BakasRKN18,
  author    = {Jamimamul Bakas and
               Praneta Rawat and
               Kalyan Kokkalla and
               Ruchira Naskar},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {Re-compression Based {JPEG} Tamper Detection and Localization Using
               Deep Neural Network, Eliminating Compression Factor Dependency},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {318--341},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_17},
  doi       = {10.1007/978-3-030-05171-6\_17},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BakasRKN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BopcheRMG18,
  author    = {Ghanshyam S. Bopche and
               Gopal N. Rai and
               Babu M. Mehtre and
               G. R. Gangadharan},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {Modeling and Analyzing Multistage Attacks Using Recursive Composition
               Algebra},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {67--87},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_4},
  doi       = {10.1007/978-3-030-05171-6\_4},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BopcheRMG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BoyerCCQD18,
  author    = {Kirk Boyer and
               Hao Chen and
               Jingwei Chen and
               Jian Qiu and
               Rinku Dewri},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {A Characterization of the Mass Surveillance Potential of Road Traffic
               Monitors},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {3--23},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_1},
  doi       = {10.1007/978-3-030-05171-6\_1},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BoyerCCQD18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Chatterjee18,
  author    = {Sumanta Chatterjee},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {Secure Moderated Bargaining Game},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {209--227},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_11},
  doi       = {10.1007/978-3-030-05171-6\_11},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Chatterjee18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DasKSY18,
  author    = {Sourav Das and
               Aashish Kolluri and
               Prateek Saxena and
               Haifeng Yu},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {(Invited Paper) on the Security of Blockchain Consensus Protocols},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {465--480},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_24},
  doi       = {10.1007/978-3-030-05171-6\_24},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DasKSY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Es-SalhiEC18,
  author    = {Khaoula Es{-}Salhi and
               David Espes and
               Nora Cuppens},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {{SONICS:} {A} Segmentation Method for Integrated {ICS} and Corporate
               System},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {231--250},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_12},
  doi       = {10.1007/978-3-030-05171-6\_12},
  timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/Es-SalhiEC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GhosalC18,
  author    = {Riddhi Ghosal and
               Sanjit Chatterjee},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {Privacy Preserving Multi-server k-means Computation over Horizontally
               Partitioned Data},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {189--208},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_10},
  doi       = {10.1007/978-3-030-05171-6\_10},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GhosalC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KabilDCCHP18,
  author    = {Alexandre Kabil and
               Thierry Duval and
               Nora Cuppens and
               G{\'{e}}rard Le Comte and
               Yoran Halgand and
               Christophe Ponchel},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {From Cyber Security Activities to Collaborative Virtual Environments
               Practices Through the 3D CyberCOP Platform},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {272--287},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_14},
  doi       = {10.1007/978-3-030-05171-6\_14},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KabilDCCHP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KishoreKR18,
  author    = {Sreesh Kishore and
               Renuka Kumar and
               Sreeranga Rajan},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {Towards Accuracy in Similarity Analysis of Android Applications},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {146--167},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_8},
  doi       = {10.1007/978-3-030-05171-6\_8},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KishoreKR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MarsalekPSZ18,
  author    = {Alexander Marsalek and
               Bernd Pr{\"{u}}nster and
               Bojan Suzic and
               Thomas Zefferer},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {SeDiCom: {A} Secure Distributed Privacy-Preserving Communication Platform},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {345--363},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_18},
  doi       = {10.1007/978-3-030-05171-6\_18},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MarsalekPSZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MilajerdiEGV18,
  author    = {Sadegh M. Milajerdi and
               Birhanu Eshete and
               Rigel Gjomemo and
               Venkat N. Venkatakrishnan},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {ProPatrol: Attack Investigation via Extracted High-Level Tasks},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {107--126},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_6},
  doi       = {10.1007/978-3-030-05171-6\_6},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MilajerdiEGV18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/NimmySA18,
  author    = {K. Nimmy and
               Sriram Sankaran and
               Krishnashree Achuthan},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {A Novel Multi-factor Authentication Protocol for Smart Home Environments},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {44--63},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_3},
  doi       = {10.1007/978-3-030-05171-6\_3},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/NimmySA18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PandaKM18,
  author    = {Suryakanta Panda and
               Madhu Kumari and
               Samrat Mondal},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {{SGP:} {A} Safe Graphical Password System Resisting Shoulder-Surfing
               Attack on Smartphones},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {129--145},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_7},
  doi       = {10.1007/978-3-030-05171-6\_7},
  timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/PandaKM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PandaM18,
  author    = {Suryakanta Panda and
               Samrat Mondal},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {drPass: {A} Dynamic and Reusable Password Generator Protocol},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {407--426},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_21},
  doi       = {10.1007/978-3-030-05171-6\_21},
  timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/PandaM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PareekP18,
  author    = {Gaurav Pareek and
               B. R. Purushothama},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {Proxy Re-Encryption Scheme for Access Control Enforcement Delegation
               on Outsourced Data in Public Cloud},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {251--271},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_13},
  doi       = {10.1007/978-3-030-05171-6\_13},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/PareekP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PathaniaRS18,
  author    = {Amit Pathania and
               B. S. Radhika and
               Rudrapatna K. Shyamasundar},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {MySecPol: {A} Client-Side Policy Language for Safe and Secure Browsing},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {427--447},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_22},
  doi       = {10.1007/978-3-030-05171-6\_22},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/PathaniaRS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PatilS18,
  author    = {Vishwas T. Patil and
               R. K. Shyamasundar},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {Efficacy of GDPR's Right-to-be-Forgotten on Facebook},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {364--385},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_19},
  doi       = {10.1007/978-3-030-05171-6\_19},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/PatilS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PatilVS18,
  author    = {Bhagyesh Patil and
               Parjanya Vyas and
               R. K. Shyamasundar},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {SecSmartLock: An Architecture and Protocol for Designing Secure Smart
               Locks},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {24--43},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_2},
  doi       = {10.1007/978-3-030-05171-6\_2},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/PatilVS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PramanikRDAS18,
  author    = {Jyotirmoy Pramanik and
               Partha Sarathi Roy and
               Sabyasachi Dutta and
               Avishek Adhikari and
               Kouichi Sakurai},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {Secret Sharing Schemes on Compartmental Access Structure in Presence
               of Cheaters},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {171--188},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_9},
  doi       = {10.1007/978-3-030-05171-6\_9},
  timestamp = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/PramanikRDAS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RajputG18,
  author    = {Ajinkya Rajput and
               K. Gopinath},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {Analysis of Newer Aadhaar Privacy Models},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {386--404},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_20},
  doi       = {10.1007/978-3-030-05171-6\_20},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RajputG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SameerDN18,
  author    = {Venkata Udaya Sameer and
               Ishaan Dali and
               Ruchira Naskar},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {A Deep Learning Based Digital Forensic Solution to Blind Source Identification
               of Facebook Images},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {291--303},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_15},
  doi       = {10.1007/978-3-030-05171-6\_15},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SameerDN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/TiwariP18,
  author    = {Abhishek Tiwari and
               Rajarshi Pal},
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {Gaze-Based Graphical Password Using Webcam},
  booktitle = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  pages     = {448--461},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6\_23},
  doi       = {10.1007/978-3-030-05171-6\_23},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/TiwariP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2018,
  editor    = {Vinod Ganapathy and
               Trent Jaeger and
               R. K. Shyamasundar},
  title     = {Information Systems Security - 14th International Conference, {ICISS}
               2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11281},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-05171-6},
  doi       = {10.1007/978-3-030-05171-6},
  isbn      = {978-3-030-05170-9},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/2018.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/AgrawallMBC17,
  author    = {Akash Agrawall and
               Shubh Maheshwari and
               Projit Bandyopadhyay and
               Venkatesh Choppella},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {Modelling and Mitigation of Cross-Origin Request Attacks on Federated
               Identity Management Using Cross Origin Request Policy},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {263--282},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_16},
  doi       = {10.1007/978-3-319-72598-7\_16},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/AgrawallMBC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BayouECC17,
  author    = {Lyes Bayou and
               David Espes and
               Nora Cuppens{-}Boulahia and
               Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {wIDS: {A} Multilayer {IDS} for Wireless-Based {SCADA} Systems},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {387--404},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_24},
  doi       = {10.1007/978-3-319-72598-7\_24},
  timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/BayouECC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BkakriaGCCL17,
  author    = {Anis Bkakria and
               Mariem Graa and
               Nora Cuppens{-}Boulahia and
               Fr{\'{e}}d{\'{e}}ric Cuppens and
               Jean{-}Louis Lanet},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {Experimenting Similarity-Based Hijacking Attacks Detection and Response
               in Android Systems},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {127--145},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_8},
  doi       = {10.1007/978-3-319-72598-7\_8},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BkakriaGCCL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChaudhariDD17,
  author    = {Payal Chaudhari and
               Manik Lal Das and
               Dipankar Dasgupta},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {88--103},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_6},
  doi       = {10.1007/978-3-319-72598-7\_6},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ChaudhariDD17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DasBSS17,
  author    = {Moumita Das and
               Ansuman Banerjee and
               Nitesh K. Singh and
               Bhaskar Sardar},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {Performance Attacks on Branch Predictors in Embedded Processors with
               {SMT} Support},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {313--322},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_19},
  doi       = {10.1007/978-3-319-72598-7\_19},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DasBSS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DaveSFLG17,
  author    = {Jay Dave and
               Shweta Saharan and
               Parvez Faruki and
               Vijay Laxmi and
               Manoj Singh Gaur},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {Secure Random Encryption for Deduplicated Storage},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {164--176},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_10},
  doi       = {10.1007/978-3-319-72598-7\_10},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DaveSFLG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GargM17,
  author    = {Varun Garg and
               Anish Mathuria},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {On Automated Detection of Multi-Protocol Attacks Using {AVISPA}},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {179--193},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_11},
  doi       = {10.1007/978-3-319-72598-7\_11},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GargM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HonapL17,
  author    = {Amrita Milind Honap and
               Wonjun Lee},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented
               Programming},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {107--126},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_7},
  doi       = {10.1007/978-3-319-72598-7\_7},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/HonapL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KhanJGN17,
  author    = {Mohsin Khan and
               Kimmo J{\"{a}}rvinen and
               Philip Ginzboorg and
               Valtteri Niemi},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {On De-synchronization of User Pseudonyms in Mobile Networks},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {347--366},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_22},
  doi       = {10.1007/978-3-319-72598-7\_22},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KhanJGN17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KomeGCCF17,
  author    = {Marco Lobe Kome and
               Mariem Graa and
               Nora Cuppens{-}Boulahia and
               Fr{\'{e}}d{\'{e}}ric Cuppens and
               Vincent Frey},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {DIscovery and REgistration Protocol - For Device and Person Identity
               Management in IoT},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {243--262},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_15},
  doi       = {10.1007/978-3-319-72598-7\_15},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KomeGCCF17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KoshleyRH17,
  author    = {Dileep Kumar Koshley and
               Sapana Rani and
               Raju Halder},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {Towards Generalization of Privacy Policy Specification and Property-Based
               Information Leakage},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {68--87},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_5},
  doi       = {10.1007/978-3-319-72598-7\_5},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KoshleyRH17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KumarKS17,
  author    = {Mahender Kumar and
               Chittaranjan Padmanabha Katti and
               Prem Chandra Saxena},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {A Secure Anonymous E-Voting System Using Identity-Based Blind Signature
               Scheme},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {29--49},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_3},
  doi       = {10.1007/978-3-319-72598-7\_3},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KumarKS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KumarRSG17,
  author    = {Vineet Kumar and
               Aneek Roy and
               Sourya Sengupta and
               Sourav Sen Gupta},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {Parallelized Common Factor Attack on {RSA}},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {303--312},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_18},
  doi       = {10.1007/978-3-319-72598-7\_18},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KumarRSG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ManciniMP17,
  author    = {Luigi V. Mancini and
               Andrea Monti and
               Agostino Panico},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {{SOF} on Trial. The Technical and Legal Value of Battlefield Digital
               Forensics in Court},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {9--26},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_2},
  doi       = {10.1007/978-3-319-72598-7\_2},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ManciniMP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MimuraT17,
  author    = {Mamoru Mimura and
               Hidema Tanaka},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {Heavy Log Reader: Learning the Context of Cyber Attacks Automatically
               with Paragraph Vector},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {146--163},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_9},
  doi       = {10.1007/978-3-319-72598-7\_9},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MimuraT17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MunkhbaatarMT17,
  author    = {Bold Munkhbaatar and
               Mamoru Mimura and
               Hidema Tanaka},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {Dark Domain Name Attack: {A} New Threat to Domain Name System},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {405--414},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_25},
  doi       = {10.1007/978-3-319-72598-7\_25},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MunkhbaatarMT17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/NayakT17,
  author    = {Sanjeet Kumar Nayak and
               Somanath Tripathy},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {{SEMFS:} Secure and Efficient Multi-keyword Fuzzy Search for Cloud
               Storage},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {50--67},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_4},
  doi       = {10.1007/978-3-319-72598-7\_4},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/NayakT17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/NguyenMT17,
  author    = {Son Duc Nguyen and
               Mamoru Mimura and
               Hidema Tanaka},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {Leveraging Man-in-the-middle DoS Attack with Internal {TCP} Retransmissions
               in Virtual Network},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {367--386},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_23},
  doi       = {10.1007/978-3-319-72598-7\_23},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/NguyenMT17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RaiDNM17,
  author    = {Sandeep Rai and
               Rushang Dhanesha and
               Sreyans Nahata and
               Bernard Menezes},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {Malicious Application Detection on Android Smartphones with Enhanced
               Static-Dynamic Analysis},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {194--208},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_12},
  doi       = {10.1007/978-3-319-72598-7\_12},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RaiDNM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RajputG17,
  author    = {Ajinkya Rajput and
               K. Gopinath},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {Towards a More Secure Aadhaar},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {283--300},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_17},
  doi       = {10.1007/978-3-319-72598-7\_17},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RajputG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RaoP17,
  author    = {Routhu Srinivasa Rao and
               Alwyn Roshan Pais},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {An Enhanced Blacklist Method to Detect Phishing Websites},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {323--333},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_20},
  doi       = {10.1007/978-3-319-72598-7\_20},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RaoP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RathAS17,
  author    = {Mayukh Rath and
               Shivali Agarwal and
               R. K. Shyamasundar},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {Semi Supervised {NLP} Based Classification of Malware Documents},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {334--344},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_21},
  doi       = {10.1007/978-3-319-72598-7\_21},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RathAS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SanthanamHKR17,
  author    = {Ganesh Ram Santhanam and
               Benjamin Holland and
               Suresh Kothari and
               Nikhil Ranade},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {Human-on-the-Loop Automation for Detecting Software Side-Channel Vulnerabilities},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {209--230},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_13},
  doi       = {10.1007/978-3-319-72598-7\_13},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SanthanamHKR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/TrivediD17,
  author    = {Nachiket Trivedi and
               Manik Lal Das},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {MalDetec: {A} Non-root Approach for Dynamic Malware Detection in Android},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {231--240},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_14},
  doi       = {10.1007/978-3-319-72598-7\_14},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/TrivediD17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Zatti17,
  author    = {Stefano Zatti},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {The Protection of Space Missions: Threats and Cyber Threats},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {3--8},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_1},
  doi       = {10.1007/978-3-319-72598-7\_1},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Zatti17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2017,
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7},
  doi       = {10.1007/978-3-319-72598-7},
  isbn      = {978-3-319-72597-0},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/2017.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BagadeR16,
  author    = {Sudhir Bagade and
               Vijay Raisinghani},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {{JITWORM:} Jitter Monitoring Based Wormhole Attack Detection in {MANET}},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {444--458},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_24},
  doi       = {10.1007/978-3-319-49806-5\_24},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BagadeR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BarikMG16,
  author    = {Mridul Sankar Barik and
               Chandan Mazumdar and
               Amarnath Gupta},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Network Vulnerability Analysis Using a Constrained Graph Data Model},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {263--282},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_14},
  doi       = {10.1007/978-3-319-49806-5\_14},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BarikMG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/CanardT16,
  author    = {S{\'{e}}bastien Canard and
               Viet Cuong Trinh},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {An Efficient Certificateless Signature Scheme in the Standard Model},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {175--192},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_9},
  doi       = {10.1007/978-3-319-49806-5\_9},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/CanardT16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/CanardT16a,
  author    = {S{\'{e}}bastien Canard and
               Viet Cuong Trinh},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel
               Broadcast Encryption},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {193--211},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_10},
  doi       = {10.1007/978-3-319-49806-5\_10},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/CanardT16a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChallaG16,
  author    = {RatnaKumari Challa and
               VijayaKumari Gunta},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Reed-Muller Code Based Symmetric Key Fully Homomorphic Encryption
               Scheme},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {499--508},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_29},
  doi       = {10.1007/978-3-319-49806-5\_29},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ChallaG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChamotraSRs16,
  author    = {Saurabh Chamotra and
               Rakesh Kumar Sehgal and
               Sanjeev Ror and
               Bhupendra Singh},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Honeypot Deployment in Broadband Networks},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {479--488},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_27},
  doi       = {10.1007/978-3-319-49806-5\_27},
  timestamp = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/ChamotraSRs16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChorgheS16,
  author    = {Sharvari Prakash Chorghe and
               Narendra Shekokar},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {A Solution to Detect Phishing in Android Devices},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {461--470},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_25},
  doi       = {10.1007/978-3-319-49806-5\_25},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ChorgheS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DeshmukhNA16,
  author    = {Maroti Deshmukh and
               Neeta Nain and
               Mushtaq Ahmed},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Enhanced Modulo Based Multi Secret Image Sharing Scheme},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {212--224},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_11},
  doi       = {10.1007/978-3-319-49806-5\_11},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DeshmukhNA16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DessaiK16,
  author    = {Kissan G. Gauns Dessai and
               Venkatesh V. Kamat},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {A Framework for Analyzing Associativity and Anonymity in Conventional
               and Electronic Summative Examinations},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {303--323},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_16},
  doi       = {10.1007/978-3-319-49806-5\_16},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DessaiK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/EssaouiniCC16,
  author    = {Nada Essaouini and
               Fr{\'{e}}d{\'{e}}ric Cuppens and
               Nora Cuppens{-}Boulahia},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Building a Fair System Using Access Rights},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {89--108},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_5},
  doi       = {10.1007/978-3-319-49806-5\_5},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/EssaouiniCC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GajeraND16,
  author    = {Hardik Gajera and
               Shruti Naik and
               Manik Lal Das},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {On the Security of "Verifiable Privacy-Preserving Monitoring for Cloud-Assisted
               mHealth Systems"},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {324--335},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_17},
  doi       = {10.1007/978-3-319-49806-5\_17},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GajeraND16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GhoshalP16,
  author    = {Sanat Ghoshal and
               Goutam Paul},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Exploiting Block-Chain Data Structure for Auditorless Auditing on
               Cloud Data},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {359--371},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_19},
  doi       = {10.1007/978-3-319-49806-5\_19},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GhoshalP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HarshaAS16,
  author    = {T. Harsha and
               S. Asha and
               B. Soniya},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Feature Selection for Effective Botnet Detection Based on Periodicity
               of Traffic},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {471--478},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_26},
  doi       = {10.1007/978-3-319-49806-5\_26},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/HarshaAS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HartogZ16,
  author    = {Jerry den Hartog and
               Nicola Zannone},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Collaborative Access Decisions: Why Has My Decision Not Been Enforced?},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {109--130},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_6},
  doi       = {10.1007/978-3-319-49806-5\_6},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/HartogZ16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HawannaKRJ16,
  author    = {Varsharani Hawanna and
               Vrushali Kulkarni and
               Rashmi Rane and
               Pooja Joshi},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Risk Evaluation of {X.509} Certificates - {A} Machine Learning Application},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {372--389},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_20},
  doi       = {10.1007/978-3-319-49806-5\_20},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/HawannaKRJ16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/JainCRS16,
  author    = {Lokesh Jain and
               Aditya Chandran and
               Sanjay Rawat and
               Kannan Srinathan},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Discovering Vulnerable Functions by Extrapolation: {A} Control-Flow
               Graph Similarity Based Approach},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {532--542},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_32},
  doi       = {10.1007/978-3-319-49806-5\_32},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/JainCRS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/JainGLM16,
  author    = {Vineeta Jain and
               Manoj Singh Gaur and
               Vijay Laxmi and
               Mohamed Mosbah},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Detection of SQLite Database Vulnerabilities in Android Apps},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {521--531},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_31},
  doi       = {10.1007/978-3-319-49806-5\_31},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/JainGLM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/JanaH16,
  author    = {Angshuman Jana and
               Raju Halder},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Defining Abstract Semantics for Static Dependence Analysis of Relational
               Database Applications},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {151--171},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_8},
  doi       = {10.1007/978-3-319-49806-5\_8},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/JanaH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/JangiralaMM16,
  author    = {Srinivas Jangirala and
               Dheerendra Mishra and
               Sourav Mukhopadhyay},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Secure Lightweight User Authentication and Key Agreement Scheme for
               Wireless Sensor Networks Tailored for the Internet of Things Environment},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {45--65},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_3},
  doi       = {10.1007/978-3-319-49806-5\_3},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/JangiralaMM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KarN16,
  author    = {Jayaprakash Kar and
               Kshirasagar Naik},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Generic Construction of Certificateless Signcryption Scheme},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {489--498},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_28},
  doi       = {10.1007/978-3-319-49806-5\_28},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KarN16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KongsgardNME16,
  author    = {Kyrre Wahl Kongsg{\aa}rd and
               Nils Agne Nordbotten and
               Federico Mancini and
               Paal E. Engelstad},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Data Loss Prevention Based on Text Classification in Controlled Environments},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {131--150},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_7},
  doi       = {10.1007/978-3-319-49806-5\_7},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KongsgardNME16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KukkalaSI16,
  author    = {Varsha Bhat Kukkala and
               Jaspal Singh Saini and
               S. R. S. Iyengar},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Privacy Preserving Network Analysis of Distributed Social Networks},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {336--355},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_18},
  doi       = {10.1007/978-3-319-49806-5\_18},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KukkalaSI16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MaheshwariM16,
  author    = {Ankit Maheshwari and
               Samrat Mondal},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {{SPOSS:} Secure Pin-Based-Authentication Obviating Shoulder Surfing},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {66--86},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_4},
  doi       = {10.1007/978-3-319-49806-5\_4},
  timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/MaheshwariM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MukherjeeSRDG16,
  author    = {Subhojeet Mukherjee and
               Hossein Shirazi and
               Indrakshi Ray and
               Jeremy Daily and
               Rose F. Gamble},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Practical DoS Attacks on Embedded Networks in Commercial Vehicles},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {23--42},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_2},
  doi       = {10.1007/978-3-319-49806-5\_2},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MukherjeeSRDG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/NandaNHJ16,
  author    = {Ashish Nanda and
               Priyadarsi Nanda and
               Xiangjian He and
               Aruna Jamdagni},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {A Secure Routing Scheme for Wireless Mesh Networks},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {393--408},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_21},
  doi       = {10.1007/978-3-319-49806-5\_21},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/NandaNHJ16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SameerSN16,
  author    = {Venkata Udaya Sameer and
               S. Sugumaran and
               Ruchira Naskar},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Digital Forensic Source Camera Identification with Efficient Feature
               Selection Using Filter, Wrapper and Hybrid Approaches},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {409--425},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_22},
  doi       = {10.1007/978-3-319-49806-5\_22},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SameerSN16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SheelaST16,
  author    = {S. J. Sheela and
               K. V. Suresh and
               Deepaknath Tandur},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Performance Evaluation of Modified Henon Map in Image Encryption},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {225--240},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_12},
  doi       = {10.1007/978-3-319-49806-5\_12},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SheelaST16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SilvaRSM16,
  author    = {Douglas Sim{\~{o}}es Silva and
               Davi Resner and
               Rick Lopes de Souza and
               Jean Everson Martina},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Formal Verification of a Cross-Layer, Trustful Space-Time Protocol
               for Wireless Sensor Networks},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {426--443},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_23},
  doi       = {10.1007/978-3-319-49806-5\_23},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SilvaRSM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SinghTB16,
  author    = {Surendra Singh and
               Sachin Tripathi and
               Suvadip Batabyal},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Secured Dynamic Scheduling Algorithm for Real-Time Applications on
               Grid},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {283--300},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_15},
  doi       = {10.1007/978-3-319-49806-5\_15},
  timestamp = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/SinghTB16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Tanaka16,
  author    = {Hidema Tanaka},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Network Counter-Attack Strategy by Topology Map Analysis},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {243--262},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_13},
  doi       = {10.1007/978-3-319-49806-5\_13},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Tanaka16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/TeichelSM16,
  author    = {Kristof Teichel and
               Dieter Sibold and
               Stefan Milius},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {An Attack Possibility on Time Synchronization Protocols Secured with
               TESLA-Like Mechanisms},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {3--22},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_1},
  doi       = {10.1007/978-3-319-49806-5\_1},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/TeichelSM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/YukselHE16,
  author    = {{\"{O}}mer Y{\"{u}}ksel and
               Jerry den Hartog and
               Sandro Etalle},
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Towards Useful Anomaly Detection for Back Office Networks},
  booktitle = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  pages     = {509--520},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5\_30},
  doi       = {10.1007/978-3-319-49806-5\_30},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/YukselHE16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2016,
  editor    = {Indrajit Ray and
               Manoj Singh Gaur and
               Mauro Conti and
               Dheeraj Sanghi and
               V. Kamakoti},
  title     = {Information Systems Security - 12th International Conference, {ICISS}
               2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10063},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-49806-5},
  doi       = {10.1007/978-3-319-49806-5},
  isbn      = {978-3-319-49805-8},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/2016.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/AgrawalDMS15,
  author    = {Sarita Agrawal and
               Manik Lal Das and
               Anish Mathuria and
               Sanjay Srivastava},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Program Integrity Verification for Detecting Node Capture Attack in
               Wireless Sensor Network},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {419--440},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_25},
  doi       = {10.1007/978-3-319-26961-0\_25},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/AgrawalDMS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BanerjeeMR15,
  author    = {Satyajit Banerjee and
               Debapriyay Mukhopadhyay and
               Suman Roy},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {A New Threshold Certification Scheme Based Defense Against Sybil Attack
               for Sensor Networks},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {562--572},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_35},
  doi       = {10.1007/978-3-319-26961-0\_35},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BanerjeeMR15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BennettRF15,
  author    = {Phillipa Bennett and
               Indrakshi Ray and
               Robert B. France},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Modeling of Online Social Network Policies Using an Attribute-Based
               Access Control Framework},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {79--97},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_6},
  doi       = {10.1007/978-3-319-26961-0\_6},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BennettRF15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BhattacharjeeM15,
  author    = {Suchismita Bhattacharjee and
               Ningrinla Marchang},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Attack-Resistant Trust-Based Weighted Majority Game Rule for Spectrum
               Sensing in Cognitive Radio Networks},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {441--460},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_26},
  doi       = {10.1007/978-3-319-26961-0\_26},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BhattacharjeeM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BollmannLMS15,
  author    = {Dominik Bollmann and
               Steffen Lortz and
               Heiko Mantel and
               Artem Starostin},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {An Automatic Inference of Minimal Security Types},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {395--415},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_24},
  doi       = {10.1007/978-3-319-26961-0\_24},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BollmannLMS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChangSS15,
  author    = {Donghoon Chang and
               Somitra Kumar Sanadhya and
               Nishant Sharma},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {New {HMAC} Message Patches: Secret Patch and CrOw Patch},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {285--302},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_17},
  doi       = {10.1007/978-3-319-26961-0\_17},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ChangSS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChaudhariDM15,
  author    = {Payal Chaudhari and
               Manik Lal Das and
               Anish Mathuria},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {On Anonymous Attribute Based Encryption},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {378--392},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_23},
  doi       = {10.1007/978-3-319-26961-0\_23},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ChaudhariDM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Choudhury15,
  author    = {Ashish Choudhury},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Asynchronous Error-Decodable Secret-Sharing and Its Application},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {364--377},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_22},
  doi       = {10.1007/978-3-319-26961-0\_22},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Choudhury15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DasA15,
  author    = {Angsuman Das and
               Avishek Adhikari},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Plaintext Checkable Signcryption},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {324--333},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_19},
  doi       = {10.1007/978-3-319-26961-0\_19},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DasA15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DasSB15,
  author    = {Moumita Das and
               Bhaskar Sardar and
               Ansuman Banerjee},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Attacks on Branch Predictors: An Empirical Exploration},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {511--520},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_30},
  doi       = {10.1007/978-3-319-26961-0\_30},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DasSB15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DeeringSK15,
  author    = {Tom Deering and
               Ganesh Ram Santhanam and
               Suresh Kothari},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {FlowMiner: Automatic Summarization of Library Data-Flow for Malware
               Analysis},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {171--191},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_11},
  doi       = {10.1007/978-3-319-26961-0\_11},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DeeringSK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Ganapathy15,
  author    = {Vinod Ganapathy},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Reflections on the Self-service Cloud Computing Project},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {36--57},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_4},
  doi       = {10.1007/978-3-319-26961-0\_4},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Ganapathy15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GanselSGFDRMK15,
  author    = {Simon Gansel and
               Stephan Schnitzer and
               Ahmad Gilbeau{-}Hammoud and
               Viktor Friesen and
               Frank D{\"{u}}rr and
               Kurt Rothermel and
               Christian Maih{\"{o}}fer and
               Ulrich Kr{\"{a}}mer},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Context-Aware Access Control in Novel Automotive {HMI} Systems},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {118--138},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_8},
  doi       = {10.1007/978-3-319-26961-0\_8},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GanselSGFDRMK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GodefroyTHM15,
  author    = {Erwan Godefroy and
               Eric Totel and
               Michel Hurfin and
               Fr{\'{e}}d{\'{e}}ric Majorczyk},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Assessment of an Automatic Correlation Rules Generator},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {207--224},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_13},
  doi       = {10.1007/978-3-319-26961-0\_13},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GodefroyTHM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/JhaSAV15,
  author    = {Sadhana Jha and
               Shamik Sural and
               Vijayalakshmi Atluri and
               Jaideep Vaidya},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Enforcing Separation of Duty in Attribute Based Access Control Systems},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {61--78},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_5},
  doi       = {10.1007/978-3-319-26961-0\_5},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/JhaSAV15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KandarD15,
  author    = {Shyamalendu Kandar and
               Bibhas Chandra Dhara},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {A (k, n) Multi Secret Sharing Scheme Using Two Variable One Way Function
               with Less Public Values},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {532--541},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_32},
  doi       = {10.1007/978-3-319-26961-0\_32},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KandarD15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KosugeITK15,
  author    = {Haruhisa Kosuge and
               Keisuke Iwai and
               Hidema Tanaka and
               Takakazu Kurokawa},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Search Algorithm of Precise Integral Distinguisher of Byte-Based Block
               Cipher},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {303--323},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_18},
  doi       = {10.1007/978-3-319-26961-0\_18},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KosugeITK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KunzFHP15,
  author    = {Michael Kunz and
               Ludwig Fuchs and
               Matthias Hummer and
               G{\"{u}}nther Pernul},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Introducing Dynamic Identity and Access Management in Organizations},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {139--158},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_9},
  doi       = {10.1007/978-3-319-26961-0\_9},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KunzFHP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LabatiGMPSS15,
  author    = {Ruggero Donida Labati and
               Angelo Genovese and
               Enrique Mu{\~{n}}oz Ballester and
               Vincenzo Piuri and
               Fabio Scotti and
               Gianluca Sforza},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Automated Border Control Systems: Biometric Challenges and Research
               Trends},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {11--20},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_2},
  doi       = {10.1007/978-3-319-26961-0\_2},
  timestamp = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/LabatiGMPSS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LiCCCFJ15,
  author    = {Yanhuang Li and
               Nora Cuppens{-}Boulahia and
               Jean{-}Michel Crom and
               Fr{\'{e}}d{\'{e}}ric Cuppens and
               Vincent Frey and
               Xiaoshu Ji},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Similarity Measure for Security Policies in Service Provider Selection},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {227--242},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_14},
  doi       = {10.1007/978-3-319-26961-0\_14},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/LiCCCFJ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MeenpalB15,
  author    = {Toshanlal Meenpal and
               A. K. Bhattacharjee},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Watermark Removal Attack Extended to Forgery Against Correlation-Based
               Watermarking Schemes},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {463--479},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_27},
  doi       = {10.1007/978-3-319-26961-0\_27},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MeenpalB15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MehtaSD15,
  author    = {Punit Mehta and
               Jigar Sharda and
               Manik Lal Das},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {SQLshield: Preventing {SQL} Injection Attacks by Modifying User Input
               Data},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {192--206},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_12},
  doi       = {10.1007/978-3-319-26961-0\_12},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MehtaSD15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MukherjeeDBD15,
  author    = {Imon Mukherjee and
               Biswajita Datta and
               Reeturaj Banerjee and
               Srijan Das},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {{DWT} Difference Modulation Based Novel Steganographic Algorithm},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {573--582},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_36},
  doi       = {10.1007/978-3-319-26961-0\_36},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MukherjeeDBD15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ParaboschiBM15,
  author    = {Stefano Paraboschi and
               Enrico Bacis and
               Simone Mutti},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Extending Mandatory Access Control Policies in Android},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {21--35},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_3},
  doi       = {10.1007/978-3-319-26961-0\_3},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ParaboschiBM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Paul15,
  author    = {Goutam Paul},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible
               Remedies},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {161--170},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_10},
  doi       = {10.1007/978-3-319-26961-0\_10},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Paul15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PrandlLP15,
  author    = {Stefan Prandl and
               Mihai M. Lazarescu and
               Duc{-}Son Pham},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {A Study of Web Application Firewall Solutions},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {501--510},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_29},
  doi       = {10.1007/978-3-319-26961-0\_29},
  timestamp = {Tue, 14 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/PrandlLP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PushkarGG15,
  author    = {Anant Pushkar and
               Nirnay Ghosh and
               Soumya K. Ghosh},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {A Statistical Approach to Detect Anomalous User Requests in SaaS Cloud-Centric
               Collaborations},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {243--262},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_15},
  doi       = {10.1007/978-3-319-26961-0\_15},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/PushkarGG15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Rao15,
  author    = {Y. Sreenivasa Rao},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
               Schemes with Fast Decryption},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {521--531},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_31},
  doi       = {10.1007/978-3-319-26961-0\_31},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Rao15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RoyCN15,
  author    = {Aniket Roy and
               Rajat Subhra Chakraborty and
               Ruchira Naskar},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Reversible Color Image Watermarking in the YCoCg-R Color Space},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {480--498},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_28},
  doi       = {10.1007/978-3-319-26961-0\_28},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RoyCN15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SaranaRSVA15,
  author    = {Prasuna Sarana and
               Arindam Roy and
               Shamik Sural and
               Jaideep Vaidya and
               Vijayalakshmi Atluri},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Role Mining in the Presence of Separation of Duty Constraints},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {98--117},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_7},
  doi       = {10.1007/978-3-319-26961-0\_7},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SaranaRSVA15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Sarkar15,
  author    = {Santanu Sarkar},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {A New Distinguisher on Grain v1 for 106 Rounds},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {334--344},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_20},
  doi       = {10.1007/978-3-319-26961-0\_20},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Sarkar15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SharmaJ15,
  author    = {Dhruti Sharma and
               Devesh Jinwala},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Functional Encryption in IoT E-Health Care System},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {345--363},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_21},
  doi       = {10.1007/978-3-319-26961-0\_21},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SharmaJ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ShyamS15,
  author    = {Radhey Shyam and
               Yogendra Narain Singh},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Robustness of Score Normalization in Multibiometric Systems},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {542--550},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_33},
  doi       = {10.1007/978-3-319-26961-0\_33},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ShyamS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SomaniJTPGS15,
  author    = {Gaurav Somani and
               Abhinav Johri and
               Mohit Taneja and
               Utkarsh Pyne and
               Manoj Singh Gaur and
               Dheeraj Sanghi},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {{DARAC:} DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {263--282},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_16},
  doi       = {10.1007/978-3-319-26961-0\_16},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SomaniJTPGS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SusheelKS15,
  author    = {S. Susheel and
               N. V. Narendra Kumar and
               R. K. Shyamasundar},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Enforcing Secure Data Sharing in Web Application Development Frameworks
               Like Django Through Information Flow Control},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {551--561},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_34},
  doi       = {10.1007/978-3-319-26961-0\_34},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SusheelKS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/VimercatiFS15,
  author    = {Sabrina De Capitani di Vimercati and
               Sara Foresti and
               Pierangela Samarati},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Data Security Issues in Cloud Scenarios},
  booktitle = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  pages     = {3--10},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0\_1},
  doi       = {10.1007/978-3-319-26961-0\_1},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/VimercatiFS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2015,
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Information Systems Security - 11th International Conference, {ICISS}
               2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9478},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26961-0},
  doi       = {10.1007/978-3-319-26961-0},
  isbn      = {978-3-319-26960-3},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/2015.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BasuMC14,
  author    = {Aditya Basu and
               Anish Mathuria and
               Nagendra Chowdary},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Automatic Generation of Compact Alphanumeric Shellcodes for x86},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {399--410},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_22},
  doi       = {10.1007/978-3-319-13841-1\_22},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BasuMC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BhattacharjeeSM14,
  author    = {Jaya Bhattacharjee and
               Anirban Sengupta and
               Chandan Mazumdar},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {A Formal Methodology for Modeling Threats to Enterprise Assets},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {149--166},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_9},
  doi       = {10.1007/978-3-319-13841-1\_9},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BhattacharjeeSM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BiskupP14,
  author    = {Joachim Biskup and
               Marcel Preu{\ss}},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Inference-Proof Data Publishing by Minimally Weakening a Database
               Instance},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {30--49},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_3},
  doi       = {10.1007/978-3-319-13841-1\_3},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BiskupP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BiswalPR14,
  author    = {Sumitra Biswal and
               Goutam Paul and
               Shashwat Raizada},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Preserving Privacy in Location-Based Services Using Sudoku Structures},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {448--463},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_26},
  doi       = {10.1007/978-3-319-13841-1\_26},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BiswalPR14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChakrabortyM14,
  author    = {Nilesh Chakraborty and
               Samrat Mondal},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {An Improved Methodology towards Providing Immunity against Weak Shoulder
               Surfing Attack},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {298--317},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_17},
  doi       = {10.1007/978-3-319-13841-1\_17},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ChakrabortyM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChoudhuryRS14,
  author    = {Hiten Choudhury and
               Basav Roychoudhury and
               Dilip Kr. Saikia},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {A Security Extension Providing User Anonymity and Relaxed Trust Requirement
               in Non-3GPP Access to the {EPS}},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {226--244},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_13},
  doi       = {10.1007/978-3-319-13841-1\_13},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ChoudhuryRS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/CybenkoJW014,
  author    = {George Cybenko and
               Sushil Jajodia and
               Michael P. Wellman and
               Peng Liu},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building
               the Scientific Foundation},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {1--8},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_1},
  doi       = {10.1007/978-3-319-13841-1\_1},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/CybenkoJW014.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DecroixBJN14,
  author    = {Koen Decroix and
               Denis Butin and
               Joachim Jansen and
               Vincent Naessens},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Inferring Accountability from Trust Perceptions},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {69--88},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_5},
  doi       = {10.1007/978-3-319-13841-1\_5},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DecroixBJN14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DoanDNT14,
  author    = {Thong M. Doan and
               Han N. Dinh and
               Nam Tuan Nguyen and
               Phuoc T. Tran},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Location Obfuscation Framework for Training-Free Localization System},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {464--476},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_27},
  doi       = {10.1007/978-3-319-13841-1\_27},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DoanDNT14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GayHM14,
  author    = {Richard Gay and
               Jinwei Hu and
               Heiko Mantel},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic
               Enforcement},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {378--398},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_21},
  doi       = {10.1007/978-3-319-13841-1\_21},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GayHM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GuptaG14,
  author    = {Puneet Gupta and
               Phalguni Gupta},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {A Vein Biometric Based Authentication System},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {425--436},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_24},
  doi       = {10.1007/978-3-319-13841-1\_24},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GuptaG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HalderDGM14,
  author    = {Biswajit Halder and
               Rajkumar Darbar and
               Utpal Garain and
               Abhoy Chand Mondal},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Analysis of Fluorescent Paper Pulps for Detecting Counterfeit Indian
               Paper Money},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {411--424},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_23},
  doi       = {10.1007/978-3-319-13841-1\_23},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/HalderDGM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HeorhiadiFRS14,
  author    = {Victor Heorhiadi and
               Seyed Kaveh Fayaz and
               Michael K. Reiter and
               Vyas Sekar},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {{SNIPS:} {A} Software-Defined Approach for Scaling Intrusion Prevention
               Systems via Offloading},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {9--29},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_2},
  doi       = {10.1007/978-3-319-13841-1\_2},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/HeorhiadiFRS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/JhaSVA14,
  author    = {Sadhana Jha and
               Shamik Sural and
               Jaideep Vaidya and
               Vijayalakshmi Atluri},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Temporal {RBAC} Security Analysis Using Logic Programming in the Presence
               of Administrative Policies},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {129--148},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_8},
  doi       = {10.1007/978-3-319-13841-1\_8},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/JhaSVA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KhanCBGP14,
  author    = {Wilayat Khan and
               Stefano Calzavara and
               Michele Bugliesi and
               Willem De Groef and
               Frank Piessens},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Client Side Web Session Integrity as a Non-interference Property},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {89--108},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_6},
  doi       = {10.1007/978-3-319-13841-1\_6},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KhanCBGP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LiDL14,
  author    = {Xiaolei Li and
               Xinshu Dong and
               Zhenkai Liang},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {A Usage-Pattern Perspective for Privacy Ranking of Android Apps},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {245--256},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_14},
  doi       = {10.1007/978-3-319-13841-1\_14},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/LiDL14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MalviyaN14,
  author    = {Pankaj Malviya and
               Ruchira Naskar},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Digital Forensic Technique for Double Compression Based {JPEG} Image
               Forgery Detection},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {437--447},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_25},
  doi       = {10.1007/978-3-319-13841-1\_25},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MalviyaN14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MayerVK14,
  author    = {Peter Mayer and
               Melanie Volkamer and
               Michaela Kauer},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Authentication Schemes - Comparison and Effective Password Spaces},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {204--225},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_12},
  doi       = {10.1007/978-3-319-13841-1\_12},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MayerVK14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PadhyaJ14,
  author    = {Mukti Padhya and
               Devesh Jinwala},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {A Novel Approach for Searchable {CP-ABE} with Hidden Ciphertext-Policy},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {167--184},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_10},
  doi       = {10.1007/978-3-319-13841-1\_10},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/PadhyaJ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PaulSM14,
  author    = {Goutam Paul and
               Pratik Sarkar and
               Sarbajit Mukherjee},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Towards a More Democratic Mining in Bitcoins},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {185--203},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_11},
  doi       = {10.1007/978-3-319-13841-1\_11},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/PaulSM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RamanujamSS14,
  author    = {Ramaswamy Ramanujam and
               Vaishnavi Sundararajan and
               S. P. Suresh},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Extending Dolev-Yao with Assertions},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {50--68},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_4},
  doi       = {10.1007/978-3-319-13841-1\_4},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RamanujamSS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RovelliV14,
  author    = {Paolo Rovelli and
               Ymir Vigfusson},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {{PMDS:} Permission-Based Malware Detection System},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {338--357},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_19},
  doi       = {10.1007/978-3-319-13841-1\_19},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RovelliV14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RoySM14,
  author    = {Arindam Roy and
               Shamik Sural and
               Arun Kumar Majumdar},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Impact of Multiple t-t {SMER} Constraints on Minimum User Requirement
               in {RBAC}},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {109--128},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_7},
  doi       = {10.1007/978-3-319-13841-1\_7},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RoySM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SainiGLSC14,
  author    = {Anil Saini and
               Manoj Singh Gaur and
               Vijay Laxmi and
               Tushar Singhal and
               Mauro Conti},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Privacy Leakage Attacks in Browsers by Colluding Extensions},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {257--276},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_15},
  doi       = {10.1007/978-3-319-13841-1\_15},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SainiGLSC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/TelikicherlaCB14,
  author    = {Krishna Chaitanya Telikicherla and
               Venkatesh Choppella and
               Bruhadeshwar Bezawada},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {{CORP:} {A} Browser Policy to Mitigate Web Infiltration Attacks},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {277--297},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_16},
  doi       = {10.1007/978-3-319-13841-1\_16},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/TelikicherlaCB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ThakurV14,
  author    = {Tanmay Thakur and
               Rakesh M. Verma},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Catching Classical and Hijack-Based Phishing Attacks},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {318--337},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_18},
  doi       = {10.1007/978-3-319-13841-1\_18},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ThakurV14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/VernotteDLLPP14,
  author    = {Alexandre Vernotte and
               Fr{\'{e}}d{\'{e}}ric Dadeau and
               Franck Lebeau and
               Bruno Legeard and
               Fabien Peureux and
               Fran{\c{c}}ois Piat},
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Efficient Detection of Multi-step Cross-Site Scripting Vulnerabilities},
  booktitle = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  pages     = {358--377},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1\_20},
  doi       = {10.1007/978-3-319-13841-1\_20},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/VernotteDLLPP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2014,
  editor    = {Atul Prakash and
               Rudrapatna K. Shyamasundar},
  title     = {Information Systems Security - 10th International Conference, {ICISS}
               2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8880},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13841-1},
  doi       = {10.1007/978-3-319-13841-1},
  isbn      = {978-3-319-13840-4},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/2014.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BagRR13,
  author    = {Samiran Bag and
               Sushmita Ruj and
               Bimal K. Roy},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Jamming Resistant Schemes for Wireless Communication: {A} Combinatorial
               Approach},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {43--62},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_4},
  doi       = {10.1007/978-3-642-45204-8\_4},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BagRR13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChaturvediMM13,
  author    = {Ankita Chaturvedi and
               Dheerendra Mishra and
               Sourav Mukhopadhyay},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Improved Biometric-Based Three-factor Remote User Authentication Scheme
               with Key Agreement Using Smart Card},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {63--77},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_5},
  doi       = {10.1007/978-3-642-45204-8\_5},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ChaturvediMM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/CliftonA13,
  author    = {Chris Clifton and
               Balamurugan Anandan},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Challenges and Opportunities for Security with Differential Privacy},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {1--13},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_1},
  doi       = {10.1007/978-3-642-45204-8\_1},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/CliftonA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DasA13,
  author    = {Angsuman Das and
               Avishek Adhikari},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Signcryption from Randomness Recoverable {PKE} Revisited},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {78--90},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_6},
  doi       = {10.1007/978-3-642-45204-8\_6},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DasA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DeP13,
  author    = {Sourya Joyee De and
               Asim K. Pal},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Auctions with Rational Adversary},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {91--105},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_7},
  doi       = {10.1007/978-3-642-45204-8\_7},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DeP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DecroixLDN13,
  author    = {Koen Decroix and
               Jorn Lapon and
               Bart De Decker and
               Vincent Naessens},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {A Framework for Formal Reasoning about Privacy Properties Based on
               Trust Relationships in Complex Electronic Services},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {106--120},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_8},
  doi       = {10.1007/978-3-642-45204-8\_8},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DecroixLDN13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HachanaCCAM13,
  author    = {Safa{\`{a}} Hachana and
               Fr{\'{e}}d{\'{e}}ric Cuppens and
               Nora Cuppens{-}Boulahia and
               Vijay Atluri and
               Stephane Morucci},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Policy Mining: {A} Bottom-Up Approach toward a Model Based Firewall
               Management},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {133--147},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_10},
  doi       = {10.1007/978-3-642-45204-8\_10},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/HachanaCCAM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/JaumeATM13,
  author    = {Mathieu Jaume and
               Radoniaina Andriatsimandefitra and
               Val{\'{e}}rie Viet Triem Tong and
               Ludovic M{\'{e}}},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Secure States versus Secure Executions - From Access Control to Flow
               Control},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {148--162},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_11},
  doi       = {10.1007/978-3-642-45204-8\_11},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/JaumeATM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KalutarageSZJ13,
  author    = {Harsha K. Kalutarage and
               Siraj A. Shaikh and
               Qin Zhou and
               Anne E. James},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Monitoring for Slow Suspicious Activities Using a Target Centric Approach},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {163--168},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_12},
  doi       = {10.1007/978-3-642-45204-8\_12},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KalutarageSZJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KerschbaumHKHSST13,
  author    = {Florian Kerschbaum and
               Martin H{\"{a}}rterich and
               Mathias Kohler and
               Isabelle Hang and
               Andreas Schaad and
               Axel Schr{\"{o}}pfer and
               Walter Tighzert},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {An Encrypted In-Memory Column-Store: The Onion Selection Problem},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {14--26},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_2},
  doi       = {10.1007/978-3-642-45204-8\_2},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KerschbaumHKHSST13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KhalidHCP13,
  author    = {Ayesha Khalid and
               Muhammad Hassan and
               Anupam Chattopadhyay and
               Goutam Paul},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {RAPID-FeinSPN: {A} Rapid Prototyping Framework for Feistel and SPN-Based
               Block Ciphers},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {169--190},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_13},
  doi       = {10.1007/978-3-642-45204-8\_13},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KhalidHCP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KumarJGU13,
  author    = {Sheethal Kumar and
               Pai B. J. Jaipal and
               Sourav Sen Gupta and
               Vigesh R. Ungrapalli},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {199--213},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_15},
  doi       = {10.1007/978-3-642-45204-8\_15},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KumarJGU13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KumarMD13,
  author    = {Naveen Kumar and
               Anish Mathuria and
               Manik Lal Das},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme
               - (Short Paper)},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {191--198},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_14},
  doi       = {10.1007/978-3-642-45204-8\_14},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KumarMD13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LorenziVSA13,
  author    = {David Lorenzi and
               Jaideep Vaidya and
               Shamik Sural and
               Vijayalakshmi Atluri},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Web Services Based Attacks against Image CAPTCHAs},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {214--229},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_16},
  doi       = {10.1007/978-3-642-45204-8\_16},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/LorenziVSA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MaitraG13,
  author    = {Subhamoy Maitra and
               Sourav Sen Gupta},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {New Long-Term Glimpse of {RC4} Stream Cipher},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {230--238},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_17},
  doi       = {10.1007/978-3-642-45204-8\_17},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MaitraG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MaityH13,
  author    = {Soumyadev Maity and
               Ramesh C. Hansdah},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection
               Protocol for MANETs},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {239--246},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_18},
  doi       = {10.1007/978-3-642-45204-8\_18},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MaityH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MishraM13,
  author    = {Dheerendra Mishra and
               Sourav Mukhopadhyay},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement
               Protocols},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {247--254},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_19},
  doi       = {10.1007/978-3-642-45204-8\_19},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MishraM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MizunoITK13,
  author    = {Hiroaki Mizuno and
               Keisuke Iwai and
               Hidema Tanaka and
               Takakazu Kurokawa},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Information Theoretical Analysis of Side-Channel Attack},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {255--269},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_20},
  doi       = {10.1007/978-3-642-45204-8\_20},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MizunoITK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MukherjeeBB13,
  author    = {Nabanita Mukherjee and
               Ayon Bhattacharya and
               Siddhartha Sekhar Bose},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Evolutionary Multibit Grouping Steganographic Algorithm},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {285--296},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_22},
  doi       = {10.1007/978-3-642-45204-8\_22},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MukherjeeBB13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MukherjeeP13,
  author    = {Imon Mukherjee and
               Goutam Paul},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Efficient Multi-bit Image Steganography in Spatial Domain},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {270--284},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_21},
  doi       = {10.1007/978-3-642-45204-8\_21},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MukherjeeP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/NgP13,
  author    = {Beng Heng Ng and
               Atul Prakash},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Let the Right One in: Discovering and Mitigating Permission Gaps},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {297--313},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_23},
  doi       = {10.1007/978-3-642-45204-8\_23},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/NgP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/OktayKKM13,
  author    = {Kerim Yasin Oktay and
               Vaibhav Khadilkar and
               Murat Kantarcioglu and
               Sharad Mehrotra},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Risk Aware Approach to Data Confidentiality in Cloud Computing},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {27--42},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_3},
  doi       = {10.1007/978-3-642-45204-8\_3},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/OktayKKM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PradweapH13,
  author    = {R. V. Pradweap and
               R. C. Hansdah},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication
               {(RAHAA)} in {VANET}},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {314--328},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_24},
  doi       = {10.1007/978-3-642-45204-8\_24},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/PradweapH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RaoD13,
  author    = {Y. Sreenivasa Rao and
               Ratna Dutta},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Recipient Anonymous Ciphertext-Policy Attribute Based Encryption},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {329--344},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_25},
  doi       = {10.1007/978-3-642-45204-8\_25},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RaoD13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SarkarGM13,
  author    = {Santanu Sarkar and
               Sourav Sen Gupta and
               Subhamoy Maitra},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Error Correction of Partially Exposed {RSA} Private Keys from {MSB}
               Side},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {345--359},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_26},
  doi       = {10.1007/978-3-642-45204-8\_26},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SarkarGM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SaxenaGB13,
  author    = {Anuj Shanker Saxena and
               Vikram Goyal and
               Debajyoti Bera},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Efficient Enforcement of Privacy for Moving Object Trajectories},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {360--374},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_27},
  doi       = {10.1007/978-3-642-45204-8\_27},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SaxenaGB13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SharmaSAV13,
  author    = {Manisha Sharma and
               Shamik Sural and
               Vijayalakshmi Atluri and
               Jaideep Vaidya},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {An Administrative Model for Spatio-Temporal Role Based Access Control},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {375--389},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_28},
  doi       = {10.1007/978-3-642-45204-8\_28},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SharmaSAV13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SobhdelJ13,
  author    = {Yasser Sobhdel and
               Rasool Jalili},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {A UC-Secure Authenticated Contributory Group Key Exchange Protocol
               Based on Discrete Logarithm},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {390--401},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_29},
  doi       = {10.1007/978-3-642-45204-8\_29},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SobhdelJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/UmadeviS13,
  author    = {Ganugula Umadevi and
               Ashutosh Saxena},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Correctness Verification in Outsourced Databases: More Reliable Fake
               Tuples Approach},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {121--132},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_9},
  doi       = {10.1007/978-3-642-45204-8\_9},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/UmadeviS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2013,
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8},
  doi       = {10.1007/978-3-642-45204-8},
  isbn      = {978-3-642-45203-1},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/2013.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/AgrawalRDML12,
  author    = {Sarita Agrawal and
               Rodrigo Roman and
               Manik Lal Das and
               Anish Mathuria and
               Javier L{\'{o}}pez},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {A Novel Key Update Protocol in Mobile Sensor Networks},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {194--207},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_14},
  doi       = {10.1007/978-3-642-35130-3\_14},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/AgrawalRDML12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/AmrutkarSVT12,
  author    = {Chaitrali Amrutkar and
               Kapil Singh and
               Arunabh Verma and
               Patrick Traynor},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {16--34},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_2},
  doi       = {10.1007/978-3-642-35130-3\_2},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/AmrutkarSVT12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BhattacharyaDCIB12,
  author    = {Anup Kumar Bhattacharya and
               Abhijit Das and
               Dipanwita Roy Chowdhury and
               Aravind Iyer and
               Debojyoti Bhattacharya},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Autonomous Certification with List-Based Revocation for Secure {V2V}
               Communication},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {208--222},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_15},
  doi       = {10.1007/978-3-642-35130-3\_15},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BhattacharyaDCIB12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BijonKS12,
  author    = {Khalid Zaman Bijon and
               Ram Krishnan and
               Ravi S. Sandhu},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Risk-Aware {RBAC} Sessions},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {59--74},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_5},
  doi       = {10.1007/978-3-642-35130-3\_5},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BijonKS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BoltonWZ12,
  author    = {Matthew L. Bolton and
               Celeste M. Wallace and
               Lenore D. Zuck},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {On Policies and Intents},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {104--118},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_8},
  doi       = {10.1007/978-3-642-35130-3\_8},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BoltonWZ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChandraY12,
  author    = {Girish Chandra and
               Divakar Yadav},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Verification of Money Atomicity in Digital Cash Based Payment System},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {249--264},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_18},
  doi       = {10.1007/978-3-642-35130-3\_18},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ChandraY12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GhasemiNHNJ12,
  author    = {Simin Ghasemi and
               Morteza Noferesti and
               Mohammad Ali Hadavi and
               Sadegh Dorri Nogoorani and
               Rasool Jalili},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Correctness Verification in Database Outsourcing: {A} Trust-Based
               Fake Tuples Approach},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {343--351},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_24},
  doi       = {10.1007/978-3-642-35130-3\_24},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GhasemiNHNJ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Hassan12,
  author    = {Doaa Hassan},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Tracking Insecure Information Flows: {A} Prototype Evaluator in {ASF+SDF}},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {310--326},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_22},
  doi       = {10.1007/978-3-642-35130-3\_22},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Hassan12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HowladerKM12,
  author    = {Jaydeep Howlader and
               Jayanta Kar and
               Ashis Kumar Mal},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Coercion Resistant {MIX} for Electronic Auction},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {238--248},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_17},
  doi       = {10.1007/978-3-642-35130-3\_17},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/HowladerKM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Kruegel12,
  author    = {Christopher Kruegel},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Fighting Malicious Software},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {1--15},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_1},
  doi       = {10.1007/978-3-642-35130-3\_1},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Kruegel12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LiPY12,
  author    = {Weihan Li and
               Brajendra Panda and
               Qussai Yaseen},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Mitigating Insider Threat on Database Integrity},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {223--237},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_16},
  doi       = {10.1007/978-3-642-35130-3\_16},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/LiPY12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LorenziVUSA12,
  author    = {David Lorenzi and
               Jaideep Vaidya and
               Emre Uzun and
               Shamik Sural and
               Vijayalakshmi Atluri},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Attacking Image Based CAPTCHAs Using Image Recognition Techniques},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {327--342},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_23},
  doi       = {10.1007/978-3-642-35130-3\_23},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/LorenziVUSA12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MaityG12,
  author    = {Soumya Maity and
               Soumya Kanti Ghosh},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {A Cognitive Trust Model for Access Control Framework in {MANET}},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {75--88},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_6},
  doi       = {10.1007/978-3-642-35130-3\_6},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MaityG12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MaityH12,
  author    = {Soumyadev Maity and
               Ramesh C. Hansdah},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Certificate-Less On-Demand Public Key Management {(CLPKM)} for Self-organized
               MANETs},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {277--293},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_20},
  doi       = {10.1007/978-3-642-35130-3\_20},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MaityH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MatamT12,
  author    = {Rakesh Matam and
               Somanath Tripathy},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Defence against Wormhole Attacks in Wireless Mesh Networks},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {181--193},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_13},
  doi       = {10.1007/978-3-642-35130-3\_13},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MatamT12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Naldurg12,
  author    = {Prasad Naldurg},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Foundations of Dynamic Access Control},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {44--58},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_4},
  doi       = {10.1007/978-3-642-35130-3\_4},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Naldurg12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/NaskarC12,
  author    = {Ruchira Naskar and
               Rajat Subhra Chakraborty},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Fuzzy Inference Rule Based Reversible Watermarking for Digital Images},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {149--163},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_11},
  doi       = {10.1007/978-3-642-35130-3\_11},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/NaskarC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/NatarajanYZ12,
  author    = {Vivek Natarajan and
               Yi Yang and
               Sencun Zhu},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Secure Trust Metadata Management for Mobile Ad-Hoc Networks},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {164--180},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_12},
  doi       = {10.1007/978-3-642-35130-3\_12},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/NatarajanYZ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/OjamaaD12,
  author    = {Andres Ojamaa and
               Karl D{\"{u}}{\"{u}}na},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Security Assessment of Node.js Platform},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {35--43},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_3},
  doi       = {10.1007/978-3-642-35130-3\_3},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/OjamaaD12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PaulDMR12,
  author    = {Goutam Paul and
               Ian Davidson and
               Imon Mukherjee and
               S. S. Ravi},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Keyless Steganography in Spatial Domain Using \emph{Energetic} Pixels},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {134--148},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_10},
  doi       = {10.1007/978-3-642-35130-3\_10},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/PaulDMR12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PeinadoF12,
  author    = {Alberto Peinado and
               Amparo F{\'{u}}ster{-}Sabater},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Cryptographic Analysis of a Type of Sequence Generators},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {265--276},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_19},
  doi       = {10.1007/978-3-642-35130-3\_19},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/PeinadoF12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RaoD12,
  author    = {Y. Sreenivasa Rao and
               Ratna Dutta},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Computationally Efficient Secure Access Control for Vehicular Ad Hoc
               Networks},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {294--309},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_21},
  doi       = {10.1007/978-3-642-35130-3\_21},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RaoD12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SwinnenSPP12,
  author    = {Arne Swinnen and
               Raoul Strackx and
               Pieter Philippaerts and
               Frank Piessens},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {ProtoLeaks: {A} Reliable and Protocol-Independent Network Covert Channel},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {119--133},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_9},
  doi       = {10.1007/978-3-642-35130-3\_9},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SwinnenSPP12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ToumiAC12,
  author    = {Khalifa Toumi and
               C{\'{e}}sar Andr{\'{e}}s and
               Ana R. Cavalli},
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Trust-orBAC: {A} Trust Access Control Model in Multi-Organization
               Environments},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  pages     = {89--103},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_7},
  doi       = {10.1007/978-3-642-35130-3\_7},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ToumiAC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2012,
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3},
  doi       = {10.1007/978-3-642-35130-3},
  isbn      = {978-3-642-35129-7},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/2012.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/AhmedRA11,
  author    = {Faraz Ahmed and
               M. Zubair Rafique and
               Muhammad Abulaish},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {A Data Mining Framework for Securing 3G Core Network from {GTP} Fuzzing
               Attacks},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {280--293},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_19},
  doi       = {10.1007/978-3-642-25560-1\_19},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/AhmedRA11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BanerjeeMBCN11,
  author    = {Prithu Banerjee and
               Mahasweta Mitra and
               Ferdous A. Barbhuiya and
               Sandip Chakraborty and
               Sukumar Nandi},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {An Efficient Decentralized Rekeying Scheme to Secure Hierarchical
               Geographic Multicast Routing in Wireless Sensor Networks},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {294--308},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_20},
  doi       = {10.1007/978-3-642-25560-1\_20},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BanerjeeMBCN11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BasuSS11,
  author    = {Atanu Basu and
               Indranil Sengupta and
               Jamuna Kanta Sing},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Secured Cloud Storage Scheme Using {ECC} Based Key Management in User
               Hierarchy},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {175--189},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_12},
  doi       = {10.1007/978-3-642-25560-1\_12},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BasuSS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BurghouwtSS11,
  author    = {Pieter Burghouwt and
               Marcel E. M. Spruit and
               Henk J. Sips},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Towards Detection of Botnet Communication through Social Media by
               Monitoring User Activity},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {131--143},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_9},
  doi       = {10.1007/978-3-642-25560-1\_9},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BurghouwtSS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/CavallaroS11,
  author    = {Lorenzo Cavallaro and
               R. Sekar},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Taint-Enhanced Anomaly Detection},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {160--174},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_11},
  doi       = {10.1007/978-3-642-25560-1\_11},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/CavallaroS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DasMPS11,
  author    = {Apurba Das and
               Subhamoy Maitra and
               Goutam Paul and
               Santanu Sarkar},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Some Combinatorial Results towards State Recovery Attack on {RC4}},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {204--214},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_14},
  doi       = {10.1007/978-3-642-25560-1\_14},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DasMPS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DattaBCDGJKS11,
  author    = {Anupam Datta and
               Jeremiah Blocki and
               Nicolas Christin and
               Henry DeYoung and
               Deepak Garg and
               Limin Jia and
               Dilsun Kirli Kaynar and
               Arunesh Sinha},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Understanding and Protecting Privacy: Formal Semantics and Principled
               Audit Mechanisms},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {1--27},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_1},
  doi       = {10.1007/978-3-642-25560-1\_1},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DattaBCDGJKS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Enck11,
  author    = {William Enck},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Defending Users against Smartphone Apps: Techniques and Future Directions},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {49--70},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_3},
  doi       = {10.1007/978-3-642-25560-1\_3},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Enck11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GadyatskayaLM11,
  author    = {Olga Gadyatskaya and
               Eduardo Lostal and
               Fabio Massacci},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Load Time Security Verification},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {250--264},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_17},
  doi       = {10.1007/978-3-642-25560-1\_17},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GadyatskayaLM11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GeneiatakisPK11,
  author    = {Dimitris Geneiatakis and
               Georgios Portokalidis and
               Angelos D. Keromytis},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {A Multilayer Overlay Network Architecture for Enhancing {IP} Services
               Availability against DoS},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {322--336},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_22},
  doi       = {10.1007/978-3-642-25560-1\_22},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GeneiatakisPK11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Goyal11,
  author    = {Vipul Goyal},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Secure Composition of Cryptographic Protocols},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {71},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_4},
  doi       = {10.1007/978-3-642-25560-1\_4},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Goyal11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GuptaS11,
  author    = {Indivar Gupta and
               P. K. Saxena},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Distributed Signcryption from Pairings},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {215--234},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_15},
  doi       = {10.1007/978-3-642-25560-1\_15},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GuptaS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GuptaSX11,
  author    = {Puneet Gupta and
               Scott D. Stoller and
               Zhongyuan Xu},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Abductive Analysis of Administrative Policies in Rule-Based Access
               Control},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {116--130},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_8},
  doi       = {10.1007/978-3-642-25560-1\_8},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GuptaSX11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HuangSEKS11,
  author    = {Yan Huang and
               Chih{-}Hao Shen and
               David Evans and
               Jonathan Katz and
               Abhi Shelat},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Efficient Secure Computation with Garbled Circuits},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {28--48},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_2},
  doi       = {10.1007/978-3-642-25560-1\_2},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/HuangSEKS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/JaumeTM11,
  author    = {Mathieu Jaume and
               Val{\'{e}}rie Viet Triem Tong and
               Ludovic M{\'{e}}},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Flow Based Interpretation of Access Control: Detection of Illegal
               Information Flows},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {72--86},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_5},
  doi       = {10.1007/978-3-642-25560-1\_5},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/JaumeTM11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KrishnanS11,
  author    = {Ram Krishnan and
               Ravi S. Sandhu},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Authorization Policy Specification and Enforcement for Group-Centric
               Secure Information Sharing},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {102--115},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_7},
  doi       = {10.1007/978-3-642-25560-1\_7},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KrishnanS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KuhnhauserP11,
  author    = {Winfried E. K{\"{u}}hnhauser and
               Anja P{\"{o}}lck},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Towards Access Control Model Engineering},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {379--382},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_27},
  doi       = {10.1007/978-3-642-25560-1\_27},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KuhnhauserP11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MaggiBSZ11,
  author    = {Federico Maggi and
               Andrea Bellini and
               Guido Salvaneschi and
               Stefano Zanero},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Finding Non-trivial Malware Naming Inconsistencies},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {144--159},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_10},
  doi       = {10.1007/978-3-642-25560-1\_10},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MaggiBSZ11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/NadkarniMP11,
  author    = {Tanusha S. Nadkarni and
               Radhesh Mohandas and
               Alwyn R. Pais},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {IFrandbox - Client Side Protection from Malicious Injected Iframes},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {383--386},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_28},
  doi       = {10.1007/978-3-642-25560-1\_28},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/NadkarniMP11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/NaskarC11,
  author    = {Ruchira Naskar and
               Rajat Subhra Chakraborty},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Reversible Image Watermarking through Coordinate Logic Operation Based
               Prediction},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {190--203},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_13},
  doi       = {10.1007/978-3-642-25560-1\_13},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/NaskarC11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/NoferestiHJ11,
  author    = {Morteza Noferesti and
               Mohammad Ali Hadavi and
               Rasool Jalili},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {A Signature-Based Approach of Correctness Assurance in Data Outsourcing
               Scenarios},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {374--378},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_26},
  doi       = {10.1007/978-3-642-25560-1\_26},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/NoferestiHJ11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RagavanP11,
  author    = {Harini Ragavan and
               Brajendra Panda},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Mitigation of Malicious Modifications by Insiders in Databases},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {337--351},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_23},
  doi       = {10.1007/978-3-642-25560-1\_23},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RagavanP11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SaxenaPGB11,
  author    = {Anuj Shanker Saxena and
               Mayank Pundir and
               Vikram Goyal and
               Debajyoti Bera},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Preserving Location Privacy for Continuous Queries on Known Route},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {265--279},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_18},
  doi       = {10.1007/978-3-642-25560-1\_18},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SaxenaPGB11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SchneiderPE11,
  author    = {Christian A. Schneider and
               Jonas Pfoh and
               Claudia Eckert},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {A Universal Semantic Bridge for Virtual Machine Introspection},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {370--373},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_25},
  doi       = {10.1007/978-3-642-25560-1\_25},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SchneiderPE11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/TedescoHS11,
  author    = {Filippo Del Tedesco and
               Sebastian Hunt and
               David Sands},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {A Semantic Hierarchy for Erasure Policies},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {352--369},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_24},
  doi       = {10.1007/978-3-642-25560-1\_24},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/TedescoHS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ThomasCC11,
  author    = {Julien A. Thomas and
               Fr{\'{e}}d{\'{e}}ric Cuppens and
               Nora Cuppens{-}Boulahia},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Consistency Policies for Dynamic Information Systems with Declassification
               Flows},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {87--101},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_6},
  doi       = {10.1007/978-3-642-25560-1\_6},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ThomasCC11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/VeeningenWZ11,
  author    = {Meilof Veeningen and
               Benne de Weger and
               Nicola Zannone},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Formal Privacy Analysis of Communication Protocols for Identity Management},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {235--249},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_16},
  doi       = {10.1007/978-3-642-25560-1\_16},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/VeeningenWZ11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/YadavLR11,
  author    = {Ravi Shankar Yadav and
               Praveen Likhar and
               M. Keshava Rao},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {SecWEM: {A} Security Solution for Web Based E-mail},
  booktitle = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  pages     = {309--321},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1\_21},
  doi       = {10.1007/978-3-642-25560-1\_21},
  timestamp = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/YadavLR11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2011,
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Information Systems Security - 7th International Conference, {ICISS}
               2011, Kolkata, India, December 15-19, 2011, Procedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7093},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25560-1},
  doi       = {10.1007/978-3-642-25560-1},
  isbn      = {978-3-642-25559-5},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/2011.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/AckerNPYP10,
  author    = {Steven Van Acker and
               Nick Nikiforakis and
               Pieter Philippaerts and
               Yves Younan and
               Frank Piessens},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {ValueGuard: Protection of Native Applications against Data-Only Buffer
               Overflows},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {156--170},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_12},
  doi       = {10.1007/978-3-642-17714-9\_12},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/AckerNPYP10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BeckerMB10,
  author    = {Moritz Y. Becker and
               Alexander Malkis and
               Laurent Bussard},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {A Practical Generic Privacy Language},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {125--139},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_10},
  doi       = {10.1007/978-3-642-17714-9\_10},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BeckerMB10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BirgissonRS10,
  author    = {Arnar Birgisson and
               Alejandro Russo and
               Andrei Sabelfeld},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {Unifying Facets of Information Integrity},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {48--65},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_5},
  doi       = {10.1007/978-3-642-17714-9\_5},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BirgissonRS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/CaiSLDL10,
  author    = {Shaoying Cai and
               Chunhua Su and
               Yingjiu Li and
               Robert H. Deng and
               Tieyan Li},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply
               Chains},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {246--260},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_18},
  doi       = {10.1007/978-3-642-17714-9\_18},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/CaiSLDL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChenXHMX10,
  author    = {Ping Chen and
               Xiao Xing and
               Hao Han and
               Bing Mao and
               Li Xie},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {Efficient Detection of the Return-Oriented Programming Malicious Code},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {140--155},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_11},
  doi       = {10.1007/978-3-642-17714-9\_11},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ChenXHMX10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DaoS10,
  author    = {Thanh{-}Binh Dao and
               Etsuya Shibayama},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {Coverage Criteria for Automatic Security Testing of Web Applications},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {111--124},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_9},
  doi       = {10.1007/978-3-642-17714-9\_9},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DaoS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/FaghihAJ10,
  author    = {Fathieh Faghih and
               Morteza Amini and
               Rasool Jalili},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {Specification of History Based Constraints for Access Control in Conceptual
               Level},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {186--200},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_14},
  doi       = {10.1007/978-3-642-17714-9\_14},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/FaghihAJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GiffinS10,
  author    = {Jonathon T. Giffin and
               Abhinav Srivastava},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {Attribution of Malicious Behavior},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {28--47},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_4},
  doi       = {10.1007/978-3-642-17714-9\_4},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GiffinS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HalderC10,
  author    = {Raju Halder and
               Agostino Cortesi},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {A Persistent Public Watermarking of Relational Databases},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {216--230},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_16},
  doi       = {10.1007/978-3-642-17714-9\_16},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/HalderC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Jaume10,
  author    = {Mathieu Jaume},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {Security Rules \emph{versus} Security Properties},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {231--245},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_17},
  doi       = {10.1007/978-3-642-17714-9\_17},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Jaume10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KumarSG10,
  author    = {Ravi Kumar and
               Shamik Sural and
               Arobinda Gupta},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {Mining {RBAC} Roles under Cardinality Constraint},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {171--185},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_13},
  doi       = {10.1007/978-3-642-17714-9\_13},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KumarSG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Myers10,
  author    = {Andrew C. Myers},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {Toward Securely Programming the Internet},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {27},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_3},
  doi       = {10.1007/978-3-642-17714-9\_3},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Myers10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/NandiPV10,
  author    = {Mridul Nandi and
               Stefan Popoveniuc and
               Poorvi L. Vora},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {Stamp-It: {A} Method for Enhancing the Universal Verifiability of
               {E2E} Voting Systems},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {81--95},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_7},
  doi       = {10.1007/978-3-642-17714-9\_7},
  timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/NandiPV10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Rajamani10,
  author    = {Sriram K. Rajamani},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {Analyzing Explicit Information Flow},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {1--2},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_1},
  doi       = {10.1007/978-3-642-17714-9\_1},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Rajamani10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SrinivasanDGB10,
  author    = {Raghunathan Srinivasan and
               Partha Dasgupta and
               Tushar Gohad and
               Amiya Bhattacharya},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {Determining the Integrity of Application Binaries on Unsecure Legacy
               Machines Using Software Based Remote Attestation},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {66--80},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_6},
  doi       = {10.1007/978-3-642-17714-9\_6},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SrinivasanDGB10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/VenkatakrishnanBLZGG10,
  author    = {V. N. Venkatakrishnan and
               Prithvi Bisht and
               Mike Ter Louw and
               Michelle Zhou and
               Kalpana Gondi and
               Karthik Thotta Ganesh},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {WebAppArmor: {A} Framework for Robust Prevention of Attacks on Web
               Applications (Invited Paper)},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {3--26},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_2},
  doi       = {10.1007/978-3-642-17714-9\_2},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/VenkatakrishnanBLZGG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/WangZP10,
  author    = {Wei Wang and
               Xiangliang Zhang and
               Georgios Pitsilis},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {Abstracting Audit Data for Lightweight Intrusion Detection},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {201--215},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_15},
  doi       = {10.1007/978-3-642-17714-9\_15},
  timestamp = {Mon, 07 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/WangZP10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ZhouBV10,
  author    = {Michelle Zhou and
               Prithvi Bisht and
               V. N. Venkatakrishnan},
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {Strengthening {XSRF} Defenses for Legacy Web Applications Using Whitebox
               Analysis and Transformation},
  booktitle = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  pages     = {96--110},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9\_8},
  doi       = {10.1007/978-3-642-17714-9\_8},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ZhouBV10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2010,
  editor    = {Somesh Jha and
               Anish Mathuria},
  title     = {Information Systems Security - 6th International Conference, {ICISS}
               2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6503},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17714-9},
  doi       = {10.1007/978-3-642-17714-9},
  isbn      = {978-3-642-17713-2},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/2010.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/AdjedjBCK09,
  author    = {Michael Adjedj and
               Julien Bringer and
               Herv{\'{e}} Chabanne and
               Bruno Kindarji},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {Biometric Identification over Encrypted Data Made Feasible},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {86--100},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_8},
  doi       = {10.1007/978-3-642-10772-6\_8},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/AdjedjBCK09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BeraGD09,
  author    = {Padmalochan Bera and
               Soumya Kanti Ghosh and
               Pallab Dasgupta},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {Formal Verification of Security Policy Implementations in Enterprise
               Networks},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {117--131},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_10},
  doi       = {10.1007/978-3-642-10772-6\_10},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BeraGD09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BhattacharyaC09,
  author    = {Sukriti Bhattacharya and
               Agostino Cortesi},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {A Generic Distortion Free Watermarking Technique for Relational Databases},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {252--264},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_19},
  doi       = {10.1007/978-3-642-10772-6\_19},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BhattacharyaC09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChenXSYMX09,
  author    = {Ping Chen and
               Hai Xiao and
               Xiaobin Shen and
               Xinchun Yin and
               Bing Mao and
               Li Xie},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {{DROP:} Detecting Return-Oriented Programming Malicious Code},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {163--177},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_13},
  doi       = {10.1007/978-3-642-10772-6\_13},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ChenXSYMX09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DacierPT09,
  author    = {Marc Dacier and
               Van{-}Hau Pham and
               Olivier Thonnard},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {The {WOMBAT} Attack Attribution Method: Some Results},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {19--37},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_3},
  doi       = {10.1007/978-3-642-10772-6\_3},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DacierPT09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Frias-MartinezSK09,
  author    = {Vanessa Fr{\'{\i}}as{-}Mart{\'{\i}}nez and
               Salvatore J. Stolfo and
               Angelos D. Keromytis},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {{BARTER:} Behavior Profile Exchange for Behavior-Based Admission and
               Access Control in MANETs},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {193--207},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_15},
  doi       = {10.1007/978-3-642-10772-6\_15},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Frias-MartinezSK09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/FuZL09,
  author    = {Ge Fu and
               Hong Zhu and
               Yingjiu Li},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {A Robust Damage Assessment Model for Corrupted Database Systems},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {237--251},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_18},
  doi       = {10.1007/978-3-642-10772-6\_18},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/FuZL09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GampaKS09,
  author    = {Nagaraja Kaushik Gampa and
               Rohit Ashok Khot and
               Kannan Srinathan},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {Let Only the Right One {IN:} Privacy Management Scheme for Social
               Network},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {310--317},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_24},
  doi       = {10.1007/978-3-642-10772-6\_24},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GampaKS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Govindaraju09,
  author    = {Venu Govindaraju},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {Biometrics and Security},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {38},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_4},
  doi       = {10.1007/978-3-642-10772-6\_4},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Govindaraju09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GuptaP09,
  author    = {Gaurav Gupta and
               Josef Pieprzyk},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {Database Relation Watermarking Resilient against Secondary Watermarking
               Attacks},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {222--236},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_17},
  doi       = {10.1007/978-3-642-10772-6\_17},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GuptaP09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Keromytis09,
  author    = {Angelos D. Keromytis},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {A Survey of Voice over {IP} Security Research},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {1--17},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_1},
  doi       = {10.1007/978-3-642-10772-6\_1},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Keromytis09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LiangLMLD09,
  author    = {Bing Liang and
               Yingjiu Li and
               Changshe Ma and
               Tieyan Li and
               Robert H. Deng},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {On the Untraceability of Anonymous {RFID} Authentication Protocol
               with Constant Key-Lookup},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {71--85},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_7},
  doi       = {10.1007/978-3-642-10772-6\_7},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/LiangLMLD09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LiangV09,
  author    = {Zhiyao Liang and
               Rakesh M. Verma},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {Correcting and Improving the {NP} Proof for Cryptographic Protocol
               Insecurity},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {101--116},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_9},
  doi       = {10.1007/978-3-642-10772-6\_9},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/LiangV09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Mancillas-LopezCR09,
  author    = {Cuauhtemoc Mancillas{-}L{\'{o}}pez and
               Debrup Chakraborty and
               Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {On Some Weaknesses in the Disk Encryption Schemes {EME} and {EME2}},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {265--279},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_20},
  doi       = {10.1007/978-3-642-10772-6\_20},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Mancillas-LopezCR09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MartignoniPB09,
  author    = {Lorenzo Martignoni and
               Roberto Paleari and
               Danilo Bruschi},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {A Framework for Behavior-Based Malware Analysis in the Cloud},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {178--192},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_14},
  doi       = {10.1007/978-3-642-10772-6\_14},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MartignoniPB09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MasiPT09,
  author    = {Massimiliano Masi and
               Rosario Pugliese and
               Francesco Tiezzi},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {On Secure Implementation of an {IHE} XUA-Based Protocol for Authenticating
               Healthcare Professionals},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {55--70},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_6},
  doi       = {10.1007/978-3-642-10772-6\_6},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MasiPT09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MukkamalaKY09,
  author    = {Ravi Mukkamala and
               Vishnu Kamisetty and
               Pawankumar Yedugani},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {Detecting and Resolving Misconfigurations in Role-Based Access Control
               (Short Paper)},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {318--325},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_25},
  doi       = {10.1007/978-3-642-10772-6\_25},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MukkamalaKY09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Nagaratnam09,
  author    = {Nataraj Nagaratnam},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {Security for a Smarter Planet},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {18},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_2},
  doi       = {10.1007/978-3-642-10772-6\_2},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Nagaratnam09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/OjhaKJL09,
  author    = {Shrikant Ojha and
               Naveen Kumar and
               Kritika Jain and
               Sangeeta Lal},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {{TWIS} - {A} Lightweight Block Cipher},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {280--291},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_21},
  doi       = {10.1007/978-3-642-10772-6\_21},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/OjhaKJL09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ReiterSSZ09,
  author    = {Michael K. Reiter and
               Vyas Sekar and
               Chad Spensky and
               Zhenghao Zhang},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {Making Peer-Assisted Content Distribution Robust to Collusion Using
               Bandwidth Puzzles},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {132--147},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_11},
  doi       = {10.1007/978-3-642-10772-6\_11},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ReiterSSZ09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SahaM09,
  author    = {Indranil Saha and
               Debapriyay Mukhopadhyay},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {Quantitative Analysis of a Probabilistic Non-repudiation Protocol
               through Model Checking},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {292--300},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_22},
  doi       = {10.1007/978-3-642-10772-6\_22},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SahaM09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SmartR09,
  author    = {Matt Smart and
               Eike Ritter},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {Remote Electronic Voting with Revocable Anonymity},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {39--54},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_5},
  doi       = {10.1007/978-3-642-10772-6\_5},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SmartR09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/WhiteP09,
  author    = {Jonathan White and
               Brajendra Panda},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {Automatic Identification of Critical Data Items in a Database to Mitigate
               the Effects of Malicious Insiders},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {208--221},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_16},
  doi       = {10.1007/978-3-642-10772-6\_16},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/WhiteP09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ZarnettLT09,
  author    = {Jeff Zarnett and
               Patrick Lam and
               Mahesh V. Tripunitara},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {Method-Specific Java Access Control via {RMI} Proxy Objects Using
               Annotations},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {301--309},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_23},
  doi       = {10.1007/978-3-642-10772-6\_23},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ZarnettLT09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ZhangKKZCKL09,
  author    = {Zhen Zhang and
               K. H. (Kane) Kim and
               Myeong{-}Ho Kang and
               Tianran Zhou and
               Byung{-}Ho Chung and
               Shin{-}Hyo Kim and
               Seok{-}Joon Lee},
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing
               of Information Products},
  booktitle = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  pages     = {148--162},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6\_12},
  doi       = {10.1007/978-3-642-10772-6\_12},
  timestamp = {Sat, 19 Oct 2019 20:06:10 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ZhangKKZCKL09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2009,
  editor    = {Atul Prakash and
               Indranil Gupta},
  title     = {Information Systems Security, 5th International Conference, {ICISS}
               2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5905},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10772-6},
  doi       = {10.1007/978-3-642-10772-6},
  isbn      = {978-3-642-10771-9},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/2009.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Avancha08,
  author    = {Sasikanth Avancha},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {A Framework for Trustworthy Service-Oriented Computing (Short Paper)},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {124--131},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_9},
  doi       = {10.1007/978-3-540-89862-7\_9},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Avancha08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BaatarjavDP08,
  author    = {Enkh{-}Amgalan Baatarjav and
               Ram Dantu and
               Santi Phithakkitnukoon},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {Privacy Management for Facebook},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {273--286},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_23},
  doi       = {10.1007/978-3-540-89862-7\_23},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BaatarjavDP08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/CuppensCT08,
  author    = {Fr{\'{e}}d{\'{e}}ric Cuppens and
               Nora Cuppens{-}Boulahia and
               Julien A. Thomas},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {A Robust Reputation Scheme for Decentralized Group Management Systems},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {71--85},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_5},
  doi       = {10.1007/978-3-540-89862-7\_5},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/CuppensCT08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DSouzaHKRS08,
  author    = {Deepak D'Souza and
               Raveendra Holla and
               Janardhan Kulkarni and
               Raghavendra K. Ramesh and
               Barbara Sprick},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {On the Decidability of Model-Checking Information Flow Properties},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {26--40},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_2},
  doi       = {10.1007/978-3-540-89862-7\_2},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DSouzaHKRS08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DasM08,
  author    = {Manik Lal Das and
               Ravi Mukkamala},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {Revisiting Bluetooth Security (Short Paper)},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {132--139},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_10},
  doi       = {10.1007/978-3-540-89862-7\_10},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DasM08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DusselGLR08,
  author    = {Patrick D{\"{u}}ssel and
               Christian Gehl and
               Pavel Laskov and
               Konrad Rieck},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {Incorporation of Application Layer Protocol Syntax into Anomaly Detection},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {188--202},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_17},
  doi       = {10.1007/978-3-540-89862-7\_17},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DusselGLR08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/FalconeFM08,
  author    = {Yli{\`{e}}s Falcone and
               Jean{-}Claude Fernandez and
               Laurent Mounier},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification
               of Properties},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {41--55},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_3},
  doi       = {10.1007/978-3-540-89862-7\_3},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/FalconeFM08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/FoschiniTCKV08,
  author    = {Luca Foschini and
               Ashish V. Thapliyal and
               Lorenzo Cavallaro and
               Christopher Kruegel and
               Giovanni Vigna},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {A Parallel Architecture for Stateful, High-Speed Intrusion Detection},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {203--220},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_18},
  doi       = {10.1007/978-3-540-89862-7\_18},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/FoschiniTCKV08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/FuchsP08,
  author    = {Ludwig Fuchs and
               G{\"{u}}nther Pernul},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {HyDRo - Hybrid Development of Roles},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {287--302},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_24},
  doi       = {10.1007/978-3-540-89862-7\_24},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/FuchsP08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/JayaramanPG08,
  author    = {Umarani Jayaraman and
               Surya Prakash and
               Phalguni Gupta},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {Indexing Multimodal Biometric Databases Using Kd-Tree with Feature
               Level Fusion},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {221--234},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_19},
  doi       = {10.1007/978-3-540-89862-7\_19},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/JayaramanPG08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/JinwalaPD08,
  author    = {Devesh C. Jinwala and
               Dhiren R. Patel and
               Kankar S. Dasgupta},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {Optimizing the Block Cipher and Modes of Operations Overhead at the
               Link Layer Security Framework in the Wireless Sensor Networks},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {258--272},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_22},
  doi       = {10.1007/978-3-540-89862-7\_22},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/JinwalaPD08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KSD08,
  author    = {Vivekananda Bhat K. and
               Indranil Sengupta and
               Abhijit Das},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {Audio Watermarking Based on Quantization in Wavelet Domain},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {235--242},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_20},
  doi       = {10.1007/978-3-540-89862-7\_20},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KSD08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KingHHJ08,
  author    = {Dave King and
               Boniface Hicks and
               Michael Hicks and
               Trent Jaeger},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {Implicit Flows: Can't Live with 'Em, Can't Live without 'Em},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {56--70},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_4},
  doi       = {10.1007/978-3-540-89862-7\_4},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KingHHJ08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LeBG08,
  author    = {Duc{-}Phong Le and
               Alexis Bonnecaze and
               Alban Gabillon},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {A Secure Round-Based Timestamping Scheme with Absolute Timestamps
               (Short Paper)},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {116--123},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_8},
  doi       = {10.1007/978-3-540-89862-7\_8},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/LeBG08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LiangV08,
  author    = {Zhiyao Liang and
               Rakesh M. Verma},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {Complexity of Checking Freshness of Cryptographic Protocols},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {86--101},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_6},
  doi       = {10.1007/978-3-540-89862-7\_6},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/LiangV08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MondalS08,
  author    = {Samrat Mondal and
               Shamik Sural},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {A Verification Framework for Temporal {RBAC} with Role Hierarchy (Short
               Paper)},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {140--147},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_11},
  doi       = {10.1007/978-3-540-89862-7\_11},
  timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/MondalS08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Nitschke08,
  author    = {Lukasz Nitschke},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {Secure Internet Voting Based on Paper Ballots},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {102--115},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_7},
  doi       = {10.1007/978-3-540-89862-7\_7},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Nitschke08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Rajan08,
  author    = {Basant Rajan},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {The Enlightened Era of Enterprise Security (Invited Talk)},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {303--305},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_25},
  doi       = {10.1007/978-3-540-89862-7\_25},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Rajan08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Sahai08,
  author    = {Amit Sahai},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {Computing on Encrypted Data},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {148--153},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_12},
  doi       = {10.1007/978-3-540-89862-7\_12},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Sahai08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SmithEJS08,
  author    = {Randy Smith and
               Cristian Estan and
               Somesh Jha and
               Ida Siahaan},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {Fast Signature Matching Using Extended Finite Automaton {(XFA)}},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {158--172},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_15},
  doi       = {10.1007/978-3-540-89862-7\_15},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SmithEJS08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SongBYCJKLNPS08,
  author    = {Dawn Xiaodong Song and
               David Brumley and
               Heng Yin and
               Juan Caballero and
               Ivan Jager and
               Min Gyung Kang and
               Zhenkai Liang and
               James Newsome and
               Pongsin Poosankam and
               Prateek Saxena},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {BitBlaze: {A} New Approach to Computer Security via Binary Analysis},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {1--25},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_1},
  doi       = {10.1007/978-3-540-89862-7\_1},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SongBYCJKLNPS08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SunithaA08,
  author    = {N. R. Sunitha and
               B. B. Amberker},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {Proxy Re-signature Schemes},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {156--157},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_14},
  doi       = {10.1007/978-3-540-89862-7\_14},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SunithaA08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/TedescoA08,
  author    = {Gianni Tedesco and
               Uwe Aickelin},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {Real-Time Alert Correlation with Type Graphs},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {173--187},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_16},
  doi       = {10.1007/978-3-540-89862-7\_16},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/TedescoA08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/VermaMP08,
  author    = {Neelam Verma and
               Prasanna R. Mishra and
               Gireesh Pandey},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {Identification of Cryptographically Strong and Weak Pseudorandom Bit
               Generators},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {154--155},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_13},
  doi       = {10.1007/978-3-540-89862-7\_13},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/VermaMP08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/WrightKS08,
  author    = {Craig S. Wright and
               Dave Kleiman and
               Shyaam Sundhar R. S.},
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {Overwriting Hard Drive Data: The Great Wiping Controversy},
  booktitle = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  pages     = {243--257},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7\_21},
  doi       = {10.1007/978-3-540-89862-7\_21},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/WrightKS08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2008,
  editor    = {R. Sekar and
               Arun K. Pujari},
  title     = {Information Systems Security, 4th International Conference, {ICISS}
               2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5352},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89862-7},
  doi       = {10.1007/978-3-540-89862-7},
  isbn      = {978-3-540-89861-0},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/2008.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BapatBM07,
  author    = {Dhananjay Bapat and
               Kevin R. B. Butler and
               Patrick D. McDaniel},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {Towards Automated Privilege Separation},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {272--276},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_24},
  doi       = {10.1007/978-3-540-77086-2\_24},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BapatBM07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BhattacharyaBBC07,
  author    = {Debojyoti Bhattacharya and
               Nitin Bansal and
               Amitava Banerjee and
               Dipanwita Roy Chowdhury},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {A Near Optimal S-Box Design},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {77--90},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_7},
  doi       = {10.1007/978-3-540-77086-2\_7},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BhattacharyaBBC07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BiskupBWW07,
  author    = {Joachim Biskup and
               Dominique Marc Burgard and
               Torben Weibert and
               Lena Wiese},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {Inference Control in Logic Databases as a Constraint Satisfaction
               Problem},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {128--142},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_10},
  doi       = {10.1007/978-3-540-77086-2\_10},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BiskupBWW07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BobbaK07,
  author    = {Rakeshbabu Bobba and
               Himanshu Khurana},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {{DLPKH} - Distributed Logical Public-Key Hierarchy},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {110--127},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_9},
  doi       = {10.1007/978-3-540-77086-2\_9},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BobbaK07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Clavier07,
  author    = {Christophe Clavier},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {An Improved {SCARE} Cryptanalysis Against a Secret {A3/A8} {GSM} Algorithm},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {143--155},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_11},
  doi       = {10.1007/978-3-540-77086-2\_11},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Clavier07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DashRP07,
  author    = {Subrat Kumar Dash and
               Sanjay Rawat and
               Arun K. Pujari},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {Use of Dimensionality Reduction for Intrusion Detection},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {306--320},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_27},
  doi       = {10.1007/978-3-540-77086-2\_27},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DashRP07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GiriS07,
  author    = {Debasis Giri and
               Parmeshwary Dayal Srivastava},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {Cryptanalysis and the Improvement of Kim et al.'s Password Authentication
               Schemes},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {156--166},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_12},
  doi       = {10.1007/978-3-540-77086-2\_12},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GiriS07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GuptaSMSC07,
  author    = {Gaurav Gupta and
               R. Sultania and
               S. Mondal and
               Sanjoy Kumar Saha and
               Bhabatosh Chanda},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {A Structured Approach to Detect Scanner-Printer Used in Generating
               Fake Document},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {250--253},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_19},
  doi       = {10.1007/978-3-540-77086-2\_19},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GuptaSMSC07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KandikattuJ07,
  author    = {Ramanarayana Kandikattu and
               Lillykutty Jacob},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {A Secure Intra-domain Routing Protocol for Wireless Mesh Networks},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {37--50},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_4},
  doi       = {10.1007/978-3-540-77086-2\_4},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KandikattuJ07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KaurSMS07,
  author    = {Navdeep Kaur and
               Rajwinder Singh and
               Manoj Misra and
               Anil Kumar Sarje},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {Secure Transaction Management Protocols for {MLS/DDBMS}},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {219--233},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_17},
  doi       = {10.1007/978-3-540-77086-2\_17},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KaurSMS07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LiDKQW07,
  author    = {Jun Li and
               Dejing Dou and
               Shiwoong Kim and
               Han Qin and
               Yibo Wang},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {On Knowledge-Based Classification of Abnormal {BGP} Events},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {267--271},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_23},
  doi       = {10.1007/978-3-540-77086-2\_23},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/LiDKQW07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LimLM07,
  author    = {Meng{-}Hui Lim and
               Sanggon Lee and
               Sang{-}Jae Moon},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key
               Agreement Protocol},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {64--76},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_6},
  doi       = {10.1007/978-3-540-77086-2\_6},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/LimLM07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ModiEK07,
  author    = {Shimon K. Modi and
               Stephen J. Elliott and
               Hakil Kim},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {Performance Analysis for Multi Sensor Fingerprint Recognition System},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {292--305},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_26},
  doi       = {10.1007/978-3-540-77086-2\_26},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ModiEK07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PatraKT07,
  author    = {G. K. Patra and
               V. Anil Kumar and
               R. P. Thangavelu},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned
               Signals},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {193--207},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_15},
  doi       = {10.1007/978-3-540-77086-2\_15},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/PatraKT07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PatraKT07a,
  author    = {G. K. Patra and
               V. Anil Kumar and
               R. P. Thangavelu},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter
               Estimation},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {263--266},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_22},
  doi       = {10.1007/978-3-540-77086-2\_22},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/PatraKT07a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Prakash07,
  author    = {Atul Prakash},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {Security in Practice - Security-Usability Chasm},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {1--9},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_1},
  doi       = {10.1007/978-3-540-77086-2\_1},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Prakash07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RajaKNLPVP07,
  author    = {K. B. Raja and
               Kiran Kumar K. and
               Satish Kumar N. and
               M. S. Lakshmi and
               H. Preeti and
               K. R. Venugopal and
               Lalit M. Patnaik},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {Genetic Algorithm Based Steganography Using Wavelets},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {51--63},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_5},
  doi       = {10.1007/978-3-540-77086-2\_5},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RajaKNLPVP07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RamamohanaraoGPL07,
  author    = {Kotagiri Ramamohanarao and
               Kapil Kumar Gupta and
               Tao Peng and
               Christopher Leckie},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {The Curse of Ease of Access to the Internet},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {234--249},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_18},
  doi       = {10.1007/978-3-540-77086-2\_18},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RamamohanaraoGPL07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RayWMBHL07,
  author    = {Daniel A. Ray and
               Charles B. Ward and
               Bogdan Munteanu and
               Jonathan Blackwell and
               Xiaoyan Hong and
               Jun Li},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {Investigating the Impact of Real-World Factors on Internet Worm Propagation},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {10--24},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_2},
  doi       = {10.1007/978-3-540-77086-2\_2},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RayWMBHL07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SardanaJ07,
  author    = {Anjali Sardana and
               Ramesh Chandra Joshi},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {Simulation of Dynamic Honeypot Based Redirection to Counter Service
               Level DDoS Attacks},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {259--262},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_21},
  doi       = {10.1007/978-3-540-77086-2\_21},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SardanaJ07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SaxenaLJLS07,
  author    = {Anshuman Saxena and
               Marc Lacoste and
               Tahar Jarboui and
               Ulf L{\"{u}}cking and
               Bernd Steinke},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {A Software Framework for Autonomic Security in Pervasive Environments},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {91--109},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_8},
  doi       = {10.1007/978-3-540-77086-2\_8},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SaxenaLJLS07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ShanWM07,
  author    = {Zhiyong Shan and
               Qiuyue Wang and
               Xiaofeng Meng},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {An {OS} Security Protection Model for Defeating Attacks from Network},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {25--36},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_3},
  doi       = {10.1007/978-3-540-77086-2\_3},
  timestamp = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iciss/ShanWM07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SharifiSVZ07,
  author    = {Mohsen Sharifi and
               Alireza Saberi and
               Mojtaba Vahidi and
               Mohammad Zoroufi},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {A Zero Knowledge Password Proof Mutual Authentication Technique Against
               Real-Time Phishing Attacks},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {254--258},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_20},
  doi       = {10.1007/978-3-540-77086-2\_20},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SharifiSVZ07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SinghC07,
  author    = {Ashish Kumar Singh and
               Priya Chandran},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {A Secure and Efficient Multi-authority Proactive Election Scheme},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {208--218},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_16},
  doi       = {10.1007/978-3-540-77086-2\_16},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SinghC07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SivakumarG07,
  author    = {K. Sivakumar and
               K. Garg},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration
               (CXE)" Using {CWE} and {CVE}},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {277--291},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_25},
  doi       = {10.1007/978-3-540-77086-2\_25},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SivakumarG07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Tanaka07,
  author    = {Hidema Tanaka},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {Information Leakage Via Electromagnetic Emanations and Evaluation
               of Tempest Countermeasures},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {167--179},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_13},
  doi       = {10.1007/978-3-540-77086-2\_13},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Tanaka07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/VimercatiS07,
  author    = {Sabrina De Capitani di Vimercati and
               Pierangela Samarati},
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {Data Privacy - Problems and Solutions},
  booktitle = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  pages     = {180--192},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2\_14},
  doi       = {10.1007/978-3-540-77086-2\_14},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/VimercatiS07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2007,
  editor    = {Patrick D. McDaniel and
               Shyam K. Gupta},
  title     = {Information Systems Security, Third International Conference, {ICISS}
               2007, Delhi, India, December 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4812},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77086-2},
  doi       = {10.1007/978-3-540-77086-2},
  isbn      = {978-3-540-77085-5},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/2007.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BiskupP06,
  author    = {Joachim Biskup and
               Joerg Parthe},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Optimistic Anonymous Participation in Inter-organizational Workflow
               Instances},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {86--100},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_6},
  doi       = {10.1007/11961635\_6},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BiskupP06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ButlerEPTM06,
  author    = {Kevin R. B. Butler and
               William Enck and
               Jennifer Plasterr and
               Patrick Traynor and
               Patrick D. McDaniel},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Privacy Preserving Web-Based Email},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {116--131},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_8},
  doi       = {10.1007/11961635\_8},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ButlerEPTM06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChaithanyaSG06,
  author    = {L. Chaithanya and
               M. P. Singh and
               M. M. Gore},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Secure Data Management in Reactive Sensor Networks},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {235--248},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_16},
  doi       = {10.1007/11961635\_16},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ChaithanyaSG06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ClairJEPTMJ06,
  author    = {Luke St. Clair and
               Lisa Johansen and
               William Enck and
               Matthew Pirretti and
               Patrick Traynor and
               Patrick D. McDaniel and
               Trent Jaeger},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Password Exhaustion: Predicting the End of Password Usefulness},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {37--55},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_3},
  doi       = {10.1007/11961635\_3},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ClairJEPTMJ06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/CuppensCC06,
  author    = {Fr{\'{e}}d{\'{e}}ric Cuppens and
               Nora Cuppens{-}Boulahia and
               C{\'{e}}line Coma},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {{O2O:} Virtual Private Organizations to Manage Security Policy Interoperability},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {101--115},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_7},
  doi       = {10.1007/11961635\_7},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/CuppensCC06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DamianiVFS06,
  author    = {Ernesto Damiani and
               Sabrina De Capitani di Vimercati and
               Cristiano Fugazza and
               Pierangela Samarati},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Extending Context Descriptions in Semantics-Aware Access Control},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {162--176},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_11},
  doi       = {10.1007/11961635\_11},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DamianiVFS06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/EkelhartFKW06,
  author    = {Andreas Ekelhart and
               Stefan Fenz and
               Markus D. Klemen and
               Edgar R. Weippl},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Security Ontology: Simulating Threats to Corporate Assets},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {249--259},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_17},
  doi       = {10.1007/11961635\_17},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/EkelhartFKW06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Ghodosi06,
  author    = {Hossein Ghodosi},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext
               Attack},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {303--314},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_21},
  doi       = {10.1007/11961635\_21},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Ghodosi06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GuptaGG06,
  author    = {Shyam K. Gupta and
               Vikram Goyal and
               Anand Gupta},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Malafide Intension Based Detection of Privacy Violation in Information
               System},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {365--368},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_29},
  doi       = {10.1007/11961635\_29},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GuptaGG06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GuptaGPDG06,
  author    = {Shyam K. Gupta and
               Vikram Goyal and
               Bholi Patra and
               Sankalp Dubey and
               Anand Gupta},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Design and Development of Malafide Intension Based Privacy Violation
               Detection System (An Ongoing Research Report)},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {369--372},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_30},
  doi       = {10.1007/11961635\_30},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GuptaGPDG06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GurevichG06,
  author    = {Alex Gurevich and
               Ehud Gudes},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Recent Research on Privacy Preserving Data Mining},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {377--380},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_32},
  doi       = {10.1007/11961635\_32},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/GurevichG06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KaurSMS06,
  author    = {Navdeep Kaur and
               Rajwinder Singh and
               Manoj Misra and
               Anil Kumar Sarje},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Fairness Strategy for Multilevel Secure Concurrency Control Protocol},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {71--85},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_5},
  doi       = {10.1007/11961635\_5},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KaurSMS06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KumarS06,
  author    = {N. V. Narendra Kumar and
               R. K. Shyamasundar},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Specification and Realization of Access Control in {SPKI/SDSI}},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {177--193},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_12},
  doi       = {10.1007/11961635\_12},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KumarS06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KunduSM06,
  author    = {Amlan Kundu and
               Shamik Sural and
               Arun K. Majumdar},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Two-Stage Credit Card Fraud Detection Using Sequence Alignment},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {260--275},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_18},
  doi       = {10.1007/11961635\_18},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KunduSM06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LeeR06,
  author    = {Hyeran Lee and
               Kyung Hyune Rhee},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {High Capacity Lossless Data Hiding},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {326--336},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_23},
  doi       = {10.1007/11961635\_23},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/LeeR06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LuLW06,
  author    = {Haibing Lu and
               Yingjiu Li and
               Xintao Wu},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended
               Abstract)},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {349--352},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_25},
  doi       = {10.1007/11961635\_25},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/LuLW06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MajumdarTD06,
  author    = {Anirban Majumdar and
               Clark D. Thomborson and
               Stephen Drape},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {A Survey of Control-Flow Obfuscations},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {353--356},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_26},
  doi       = {10.1007/11961635\_26},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MajumdarTD06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MasoumzadehAJ06,
  author    = {Amirreza Masoumzadeh and
               Morteza Amini and
               Rasool Jalili},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Context-Aware Provisional Access Control},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {132--146},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_9},
  doi       = {10.1007/11961635\_9},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MasoumzadehAJ06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RaoMP06,
  author    = {Y. V. Subba Rao and
               Abhijit Mitra and
               S. R. Mahadeva Prasanna},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {A Partial Image Encryption Method with Pseudo Random Sequences},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {315--325},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_22},
  doi       = {10.1007/11961635\_22},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RaoMP06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RayKY06,
  author    = {Indrakshi Ray and
               Mahendra Kumar and
               Lijun Yu},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {{LRBAC:} {A} Location-Aware Role-Based Access Control Model},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {147--161},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_10},
  doi       = {10.1007/11961635\_10},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RayKY06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ReddyDP06,
  author    = {Krishna Sandeep Reddy Dubba and
               Subrat Kumar Dash and
               Arun K. Pujari},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {New Malicious Code Detection Using Variable Length \emph{n}-grams},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {276--288},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_19},
  doi       = {10.1007/11961635\_19},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ReddyDP06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SahaR06,
  author    = {Mounita Saha and
               Dipanwita Roy Chowdhury},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Design of Key Establishment Protocol Using One-Way Functions to Avert
               \emph{insider-replay} Attack},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {194--204},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_13},
  doi       = {10.1007/11961635\_13},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SahaR06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SaizMJBA06,
  author    = {Purificaci{\'{o}}n S{\'{a}}iz and
               Jon Mat{\'{\i}}as and
               Eduardo Jacob and
               Javier Bustamante and
               Armando Astarloa},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Adaptation of {IEEE} 802.1X for Secure Session Establishment Between
               Ethernet Peers},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {220--234},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_15},
  doi       = {10.1007/11961635\_15},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SaizMJBA06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SenguptaB06,
  author    = {Anirban Sengupta and
               Mridul Sankar Barik},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Towards a Formal Specification Method for Enterprise Information System
               Security},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {373--376},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_31},
  doi       = {10.1007/11961635\_31},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SenguptaB06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ShanmugasundaramM06,
  author    = {Kulesh Shanmugasundaram and
               Nasir D. Memon},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Network Monitoring for Security and Forensics},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {56--70},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_4},
  doi       = {10.1007/11961635\_4},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ShanmugasundaramM06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SinghKS06,
  author    = {Rajwinder Singh and
               Navdeep Kaur and
               Anil Kumar Sarje},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Secure Itineraries Framework for Mobile Agent Systems},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {361--364},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_28},
  doi       = {10.1007/11961635\_28},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SinghKS06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SinghLMVA06,
  author    = {Vartika Singh and
               D. R. Lakshminarasimhaiah and
               Yogesh Mishra and
               Chitra Viswanathan and
               G. Athithan},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {An Implementation and Evaluation of Online Disk Encryption for Windows
               Systems},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {337--348},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_24},
  doi       = {10.1007/11961635\_24},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SinghLMVA06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SwarupSR06,
  author    = {Vipin Swarup and
               Len Seligman and
               Arnon Rosenthal},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {A Data Sharing Agreement Framework},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {22--36},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_2},
  doi       = {10.1007/11961635\_2},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SwarupSR06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/VadnalaM06,
  author    = {Praveen Kumar Vadnala and
               Anish Mathuria},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {An Efficient Key Assignment Scheme for Access Control in a Hierarchy},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {205--219},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_14},
  doi       = {10.1007/11961635\_14},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/VadnalaM06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/VimercatiS06,
  author    = {Sabrina De Capitani di Vimercati and
               Pierangela Samarati},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Privacy in the Electronic Society},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {1--21},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_1},
  doi       = {10.1007/11961635\_1},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/VimercatiS06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/YuanGLLL06,
  author    = {Weiwei Yuan and
               Donghai Guan and
               Sungyoung Lee and
               Young{-}Koo Lee and
               Heejo Lee},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Filtering Out Unfair Recommendations for Trust Model in Ubiquitous
               Environments},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {357--360},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_27},
  doi       = {10.1007/11961635\_27},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/YuanGLLL06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ZangY06,
  author    = {Wanyu Zang and
               Meng Yu},
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {A Dead-Lock Free Self-healing Algorithm for Distributed Transactional
               Processes},
  booktitle = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  pages     = {289--302},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635\_20},
  doi       = {10.1007/11961635\_20},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ZangY06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2006,
  editor    = {Aditya Bagchi and
               Vijayalakshmi Atluri},
  title     = {Information Systems Security, Second International Conference, {ICISS}
               2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4332},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11961635},
  doi       = {10.1007/11961635},
  isbn      = {3-540-68962-1},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/2006.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Bagchi-SenLRU05,
  author    = {Sharmistha Bagchi{-}Sen and
               JinKyu Lee and
               H. Raghav Rao and
               Shambhu J. Upadhyaya},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {A Framework for Examining Skill Specialization, Gender Inequity, and
               Career Advancement in the Information Security Field},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {317--321},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_24},
  doi       = {10.1007/11593980\_24},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Bagchi-SenLRU05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BhattacharyaG05,
  author    = {Jaijit Bhattacharya and
               S. K. Gupta},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {{EPAL} Based Privacy Enforcement Using {ECA} Rules},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {120--133},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_9},
  doi       = {10.1007/11593980\_9},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/BhattacharyaG05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ButlerM05,
  author    = {Kevin R. B. Butler and
               Patrick D. McDaniel},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Understanding Mutable Internet Pathogens, or How {I} Learned to Stop
               Worrying and Love Parasitic Behavior},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {36--48},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_3},
  doi       = {10.1007/11593980\_3},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ButlerM05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChakrabartiMR05,
  author    = {Dibyendu Chakrabarti and
               Subhamoy Maitra and
               Bimal K. Roy},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor
               Networks},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {228--238},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_17},
  doi       = {10.1007/11593980\_17},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ChakrabartiMR05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Chand05,
  author    = {Prem Chand},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Building India as the Destination for Secure Software Development
               - Next Wave of Opportunities for the {ICT} Industry},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {49--65},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_4},
  doi       = {10.1007/11593980\_4},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Chand05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChatterjeeSR05,
  author    = {Roshni Chatterjee and
               Moiz A. Saifee and
               Dipanwita Roy Chowdhury},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Modifications of {SHA-0} to Prevent Attacks},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {277--289},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_21},
  doi       = {10.1007/11593980\_21},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ChatterjeeSR05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChristiansonCM05,
  author    = {Bruce Christianson and
               Partha Das Chowdhury and
               James A. Malcolm},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Auditable Anonymous Delegation},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {66--76},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_5},
  doi       = {10.1007/11593980\_5},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ChristiansonCM05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/CuppensCS05,
  author    = {Fr{\'{e}}d{\'{e}}ric Cuppens and
               Nora Cuppens{-}Boulahia and
               Thierry Sans},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Protection of Relationships in {XML} Documents with the {XML-BB} Model},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {148--163},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_11},
  doi       = {10.1007/11593980\_11},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/CuppensCS05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DamianiAB05,
  author    = {Ernesto Damiani and
               Marco Anisetti and
               Valerio Bellandi},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Toward Exploiting Location-Based and Video Information in Negotiated
               Access Control Policies},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {21--35},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_2},
  doi       = {10.1007/11593980\_2},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DamianiAB05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Das05,
  author    = {Ashok Kumar Das},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {A Key Reshuffling Scheme for Wireless Sensor Networks},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {205--216},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_15},
  doi       = {10.1007/11593980\_15},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Das05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DashRP05,
  author    = {Subrat Kumar Dash and
               Krupa Sagar Reddy and
               Arun K. Pujari},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Episode Based Masquerade Detection},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {251--262},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_19},
  doi       = {10.1007/11593980\_19},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/DashRP05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HaZM05,
  author    = {JungHoon Ha and
               Jianying Zhou and
               Sang{-}Jae Moon},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {A Robust Double Auction Protocol Based on a Hybrid Trust Model},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {77--90},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_6},
  doi       = {10.1007/11593980\_6},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/HaZM05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MisraPB05,
  author    = {Jaydev Misra and
               Pinakpani Pal and
               Aditya Bagchi},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {{SPEAR:} Design of a Secured Peer-to-Peer Architecture},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {322--327},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_25},
  doi       = {10.1007/11593980\_25},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MisraPB05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MukhopadhyayCNC05,
  author    = {Debdeep Mukhopadhyay and
               Abhishek Chaudhary and
               Arvind Nebhnani and
               Dipanwita Roy Chowdhury},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {{CCMEA:} Customized Cellular Message Encryption Algorithm for Wireless
               Networks},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {217--227},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_16},
  doi       = {10.1007/11593980\_16},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MukhopadhyayCNC05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/OhLM05,
  author    = {JoongHyo Oh and
               KyungKeun Lee and
               Sang{-}Jae Moon},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {How to Solve Key Escrow and Identity Revocation in Identity-Based
               Encryption Schemes},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {290--303},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_22},
  doi       = {10.1007/11593980\_22},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/OhLM05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RadhaK05,
  author    = {V. Radha and
               N. Hemanth Kumar},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {{EISA} - An Enterprise Application Security Solution for Databases},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {164--176},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_12},
  doi       = {10.1007/11593980\_12},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RadhaK05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RamachandranN05,
  author    = {Vivek Ramachandran and
               Sukumar Nandi},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Detecting {ARP} Spoofing: An Active Technique},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {239--250},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_18},
  doi       = {10.1007/11593980\_18},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RamachandranN05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Ramkumar05,
  author    = {Mahalingam Ramkumar},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {On Broadcast Encryption with Random Key Pre-distribution Schemes},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {304--316},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_23},
  doi       = {10.1007/11593980\_23},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Ramkumar05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RayCR05,
  author    = {Indrajit Ray and
               Sudip Chakraborty and
               Indrakshi Ray},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {VTrust: {A} Trust Management System Based on a Vector Model of Trust},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {91--105},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_7},
  doi       = {10.1007/11593980\_7},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RayCR05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RayH05,
  author    = {Indrakshi Ray and
               Wei Huang},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Event Detection in Multilevel Secure Active Databases},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {177--190},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_13},
  doi       = {10.1007/11593980\_13},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/RayH05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SenguptaMRRABM05,
  author    = {Anirban Sengupta and
               Aniruddha Mukhopadhyay and
               Koel Ray and
               Aveek Guha Roy and
               Dipankar Aich and
               Mridul Sankar Barik and
               Chandan Mazumdar},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {A Web-Enabled Enterprise Security Management Framework Based on a
               Unified Model of Enterprise Information System Security},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {328--331},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_26},
  doi       = {10.1007/11593980\_26},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SenguptaMRRABM05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SubramanianPBKGSVARP05,
  author    = {N. Subramanian and
               Pramod S. Pawar and
               Mayank Bhatnagar and
               Nihar S. Khedekar and
               Srinivas Guntupalli and
               N. Satyanarayana and
               V. K. Vijaykumar and
               Praveen D. Ampatt and
               Rajiv Ranjan and
               Prasad J. Pandit},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Development of a Comprehensive Intrusion Detection System - Challenges
               and Approaches},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {332--335},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_27},
  doi       = {10.1007/11593980\_27},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SubramanianPBKGSVARP05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ThomasMEB05,
  author    = {Shince Thomas and
               Devesh Misra and
               P. R. Lakshmi Eswari and
               N. Sarat Chandra Babu},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {A Transparent End-to-End Security Solution},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {336--339},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_28},
  doi       = {10.1007/11593980\_28},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ThomasMEB05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Varadharajan05,
  author    = {Vijay Varadharajan},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Authorization and Trust Enhanced Security for Distributed Applications},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {1--20},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_1},
  doi       = {10.1007/11593980\_1},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/Varadharajan05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/VatsaSM05,
  author    = {Vishal Vatsa and
               Shamik Sural and
               Arun K. Majumdar},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {A Game-Theoretic Approach to Credit Card Fraud Detection},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {263--276},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_20},
  doi       = {10.1007/11593980\_20},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/VatsaSM05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/WangHI05,
  author    = {Jian Wang and
               Lein Harn and
               Hideki Imai},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Key Management for Multicast Fingerprinting},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {191--204},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_14},
  doi       = {10.1007/11593980\_14},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/WangHI05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/WarnerAM05,
  author    = {Janice Warner and
               Vijayalakshmi Atluri and
               Ravi Mukkamala},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {An Attribute Graph Based Approach to Map Local Access Control Policies
               to Credential Based Access Control Policies},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {134--147},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_10},
  doi       = {10.1007/11593980\_10},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/WarnerAM05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ZhaoVB05,
  author    = {Weiliang Zhao and
               Vijay Varadharajan and
               George Bryan},
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Analysis and Modelling of Trust in Distributed Information Systems},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  pages     = {106--119},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980\_8},
  doi       = {10.1007/11593980\_8},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/ZhaoVB05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2005,
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980},
  doi       = {10.1007/11593980},
  isbn      = {3-540-30706-0},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/2005.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics