Search dblp for Publications

export results for "stream:streams/conf/iciss:"

 download as .bib file

@inproceedings{DBLP:conf/iciss/AkbarRSKT23,
  author       = {Khandakar Ashrafi Akbar and
                  Fariha Ishrat Rahman and
                  Anoop Singhal and
                  Latifur Khan and
                  Bhavani Thuraisingham},
  title        = {The Design and Application of a Unified Ontology for Cyber Security},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {23--41},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/ArakkalSV23,
  author       = {Ajith Arakkal and
                  Shehzad Pazheri Sharafudheen and
                  A. R. Vasudevan},
  title        = {Crypto-Ransomware Detection: {A} Honey-File Based Approach Using Chi-Square
                  Test},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {449--458},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/BalijabuddaACC23,
  author       = {Venkata Sreekanth Balijabudda and
                  Kamalesh Acharya and
                  Rajat Subhra Chakraborty and
                  Indrajit Chakrabarti},
  title        = {Theoretical Enumeration of Deployable Single-Output Strong {PUF} Instances
                  Based on Uniformity and Uniqueness Constraints},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {77--87},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/BhaskarPJ23,
  author       = {Sourabh Bhaskar and
                  Keyur Parmar and
                  Devesh C. Jinwala},
  title        = {Escrow and Pairing Free {CP-ABE} Scheme with Forward and Backward
                  Secrecy for Healthcare Internet of Things},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {306--316},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/ChackoRAP23,
  author       = {Lenoah Chacko and
                  Pavithra Rajan and
                  Varun Anilkumar and
                  Vinod Pathari},
  title        = {Proof-of-Variable-Authority: {A} Blockchain Consensus Mechanism for
                  Securing IoT Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {396--410},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/Chandran23,
  author       = {Nishanth Chandran},
  title        = {Security and Privacy in Machine Learning},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {229--248},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/DasMDBN23,
  author       = {Arnab Kumar Das and
                  Soumik Mukhopadhyay and
                  Arijit Dalui and
                  Ritaban Bhattacharya and
                  Ruchira Naskar},
  title        = {A Multi-stage Multi-modal Classification Model for DeepFakes Combining
                  Deep Learned and Computer Vision Oriented Features},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {217--226},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/DwivediBAS23,
  author       = {Surabhi Dwivedi and
                  R. Balaji and
                  Praveen Ampatt and
                  Sithu D. Sudarsan},
  title        = {A Survey on Security Threats and Mitigation Strategies for NoSQL Databases
                  - MongoDB as a Use Case},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {57--76},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/GainB23,
  author       = {Ayan Gain and
                  Mridul Sankar Barik},
  title        = {Attack Graph Based Security Metrics for Dynamic Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {109--128},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/GhoshN23,
  author       = {Tanusree Ghosh and
                  Ruchira Naskar},
  title        = {STN-Net: {A} Robust GAN-Generated Face Detector},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {141--158},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/JainP23,
  author       = {Anubha Jain and
                  Emmanuel S. Pilli},
  title        = {SoK: Digital Signatures and Taproot Transactions in Bitcoin},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {360--379},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/KammulaAS23,
  author       = {Sunil Kumar Kammula and
                  Veena Anand and
                  Deepak Singh},
  title        = {An Energy-Conscious Surveillance Scheme for Intrusion Detection in
                  Underwater Sensor Networks Using Tunicate Swarm Optimization},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {129--138},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/Kar23,
  author       = {Jayaprakash Kar},
  title        = {{PSDP:} Blockchain-Based Computationally Efficient Provably Secure
                  Data Possession},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {459--468},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/Mager23,
  author       = {Thomas Mager},
  title        = {Big Data Forensics on Apache Kafka},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {42--56},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/MishraI23,
  author       = {Nimish Mishra and
                  SK Hafizul Islam},
  title        = {{BCTPV-NIZK:} Publicly-Verifiable Non-interactive Zero-Knowledge Proof
                  System from Minimal Blockchain Assumptions},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {380--395},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/MukherjeeTRPS23,
  author       = {Preetam Mukherjee and
                  Sabu M. Thampi and
                  N. Rohith and
                  Bishwajit Kumar Poddar and
                  Ipshita Sen},
  title        = {Detection and Hardening Strategies to Secure an Enterprise Network},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {91--108},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/NarumanchiME23,
  author       = {Harika Narumanchi and
                  Lakshmi Padmaja Maddali and
                  Nitesh Emmadi},
  title        = {Private and Verifiable Inter-bank Transactions and Settlements on
                  Blockchain},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {469--479},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/OzdenY23,
  author       = {Duygu Ozden and
                  Oguz Yayla},
  title        = {Verifiable Timed Accountable Subgroup Multi-signatures},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {295--305},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/ParbatBC23,
  author       = {Tanusree Parbat and
                  Aniket Banerjee and
                  Ayantika Chatterjee},
  title        = {Democracy in Your Hands!: Practical Multi-key Homomorphic E-Voting},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {259--271},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/PriyadarshiGK23,
  author       = {Vishisht Priyadarshi and
                  Sourav Goel and
                  Kalpesh Kapoor},
  title        = {Analysis of Optimal Number of Shards Using ShardEval, {A} Simulator
                  for Sharded Blockchains},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {339--359},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/RodriguezK23,
  author       = {David Rodriguez and
                  Ram Krishnan},
  title        = {A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep
                  Neural Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {178--196},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/SantosLW23,
  author       = {Cristian Alves dos Santos and
                  Leandro Loffi and
                  Carla Merkle Westphall},
  title        = {Ensuring Data Security in the Context of IoT Forensics Evidence Preservation
                  with Blockchain and Self-Sovereign Identities},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {319--338},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/SanyashiBS23,
  author       = {Tikaram Sanyashi and
                  Nirmal Kumar Boran and
                  Virendra Singh},
  title        = {Secure {KNN} Computation on Cloud},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {197--216},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/SethiAB23,
  author       = {Kamalakanta Sethi and
                  Aniket Agrawal and
                  Padmalochan Bera},
  title        = {Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain
                  Technology},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {431--448},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/SharmaM23,
  author       = {Abhyudaya Sharma and
                  Sweta Mishra},
  title        = {A Security Analysis of Password Managers on Android},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/SinghT23,
  author       = {Narendra Singh and
                  Somanath Tripathy},
  title        = {MDLDroid: Multimodal Deep Learning Based Android Malware Detection},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {159--177},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/SyedPSR23,
  author       = {Habeeb Syed and
                  Arinjita Paul and
                  Meena Singh Dilip Singh and
                  M. A. Rajan},
  title        = {An Efficient Two-Party {ECDSA} Scheme for Cryptocurrencies},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {411--430},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/ThusharaB23,
  author       = {G. A. Thushara and
                  S. Mary Saira Bhanu},
  title        = {Secured Collaboration with Ciphertext Policy Attribute Based Signcryption
                  in a Distributed Fog Environment for Medical Data Sharing},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {275--294},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/VargheeseV23,
  author       = {Meghana Vargheese and
                  Srinivas Vivek},
  title        = {Attack on the Privacy-Preserving Carpooling Service {TAROT}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {249--258},
  publisher    = {Springer},
  year         = {2023}
}
@proceedings{DBLP:conf/iciss/2023,
  editor       = {Vallipuram Muthukkumarasamy and
                  Sithu D. Sudarsan and
                  Rudrapatna K. Shyamasundar},
  title        = {Information Systems Security - 19th International Conference, {ICISS}
                  2023, Raipur, India, December 16-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/iciss/AmmaV22,
  author       = {N. G. Bhuvaneswari Amma and
                  P. Valarmathi},
  title        = {IoTInDet: Detecting Internet of Things Intrusions with Class Scatter
                  Ratio and Hellinger Distance Statistics},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {155--168},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iciss/BansalGB22,
  author       = {Vidhi Bansal and
                  Mohona Ghosh and
                  Niyati Baliyan},
  title        = {Efficient and Effective Static Android Malware Detection Using Machine
                  Learning},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {103--118},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iciss/DavariZ22,
  author       = {Maryam Davari and
                  Mohammad Zulkernine},
  title        = {Mining Attribute-Based Access Control Policies},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {186--201},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iciss/FaisalZ22,
  author       = {Abu Faisal and
                  Mohammad Zulkernine},
  title        = {{DKS-PKI:} {A} Distributed Key Server Architecture for Public Key
                  Infrastructure},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {23--43},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iciss/GhosalS22,
  author       = {Sandip Ghosal and
                  R. K. Shyamasundar},
  title        = {Preventing Privacy-Violating Information Flows in JavaScript Applications
                  Using Dynamic Labelling},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {202--219},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iciss/GhoshSGV22,
  author       = {Sutanu Kumar Ghosh and
                  Kiavash Satvat and
                  Rigel Gjomemo and
                  V. N. Venkatakrishnan},
  title        = {Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity
                  Detection},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iciss/HubballiP22,
  author       = {Neminath Hubballi and
                  Kanishk Patel},
  title        = {WiP: Control Plane Saturation Attack Mitigation in Software Defined
                  Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {235--246},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iciss/MadabhushiD22,
  author       = {Srinidhi Madabhushi and
                  Rinku Dewri},
  title        = {On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {220--234},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iciss/MannaKT22,
  author       = {Debasmita Manna and
                  Harsh Kasyap and
                  Somanath Tripathy},
  title        = {{MILSA:} Model Interpretation Based Label Sniffing Attack in Federated
                  Learning},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {139--154},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iciss/MortlD22,
  author       = {Karin Mortl and
                  Rinku Dewri},
  title        = {Generating-Set Evaluation of Bloom Filter Hardening Techniques in
                  Private Record Linkage},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {44--63},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iciss/RadhikaKS22,
  author       = {B. S. Radhika and
                  N. V. Narendra Kumar and
                  R. K. Shyamasundar},
  title        = {Samyukta: {A} Unified Access Control Model using Roles, Labels, and
                  Attributes},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {84--102},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iciss/SangwanJH22,
  author       = {Aniket Sangwan and
                  Sarthak Jain and
                  Neminath Hubballi},
  title        = {WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {247--259},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iciss/SinghS22,
  author       = {Gulshan Kumar Singh and
                  Gaurav Somani},
  title        = {Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud
                  Attack Detection {(OCAD)}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {169--185},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iciss/SinghTB22,
  author       = {Narendra Singh and
                  Somanath Tripathy and
                  Bruhadeshwar Bezawada},
  title        = {{SHIELD:} {A} Multimodal Deep Learning Framework for Android Malware
                  Detection},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {64--83},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iciss/SoodPH22,
  author       = {Shaurya Sood and
                  Pritesh Palod and
                  Neminath Hubballi},
  title        = {WiP: Characterizing the Impact of Multiplexed DoS Attacks on {HTTP}
                  and Detection},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {260--271},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iciss/ZouZSSL22,
  author       = {Qingtian Zou and
                  Lan Zhang and
                  Anoop Singhal and
                  Xiaoyan Sun and
                  Peng Liu},
  title        = {Attacks on {ML} Systems: From Security Analysis to Attack Mitigation},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {119--138},
  publisher    = {Springer},
  year         = {2022}
}
@proceedings{DBLP:conf/iciss/2022,
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/iciss/AkbarWISKT21,
  author       = {Khandakar Ashrafi Akbar and
                  Yigong Wang and
                  Md Shihabul Islam and
                  Anoop Singhal and
                  Latifur Khan and
                  Bhavani Thuraisingham},
  title        = {Identifying Tactics of Advanced Persistent Threats with Limited Attack
                  Traces},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  pages        = {3--25},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/iciss/AmighiBO21,
  author       = {Afshin Amighi and
                  Mortaza S. Bargh and
                  Ahmad Omar},
  title        = {WiP: {A} Distributed Approach for Statistical Disclosure Control Technologies},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  pages        = {142--153},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/iciss/AryaC21,
  author       = {Shivani Arya and
                  Saurabh Chamotra},
  title        = {Multi Layer Detection Framework for Spear-Phishing Attacks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  pages        = {38--56},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/iciss/Bhat21,
  author       = {Krishnaraj Bhat},
  title        = {A Verifiable Lossless Multiple Secret Images Sharing Scheme},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  pages        = {157--172},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/iciss/GS21,
  author       = {Renjith G and
                  Aji S},
  title        = {Vulnerability Analysis and Detection Using Graph Neural Networks for
                  Android Operating System},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  pages        = {57--72},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/iciss/KumarS21,
  author       = {Tejpal Kumar and
                  Gaurav Somani},
  title        = {Origin Information Assisted Hybrid Analysis to Detect {APT} Malware},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  pages        = {75--93},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/iciss/Mukhopadhyay21,
  author       = {Debapriyay Mukhopadhyay},
  title        = {Improvement over Montgomery Modular Multiplication},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  pages        = {212--217},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/iciss/PatilS21,
  author       = {Vishwas Patil and
                  R. K. Shyamasundar},
  title        = {Landcoin: {A} Practical Protocol for Transfer-of-Asset},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  pages        = {124--141},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/iciss/RomanaBKPE21,
  author       = {Sandeep Romana and
                  Anil D. Bandgar and
                  Mohit Kumar and
                  Mahesh Uttam Patil and
                  P. R. Lakshmi Eswari},
  title        = {Raising {MIPS} Binaries to {LLVM} {IR}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  pages        = {94--108},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/iciss/SaravaniRR21,
  author       = {Sina Mahdipour Saravani and
                  Indrajit Ray and
                  Indrakshi Ray},
  title        = {Automated Identification of Social Media Bots Using Deepfake Text
                  Detection},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  pages        = {111--123},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/iciss/ShaikCRGBL21,
  author       = {Imtiyazuddin Shaik and
                  Raj Chaudhari and
                  M. A. Rajan and
                  Jay Gubbi and
                  P. Balamuralidhar and
                  Sachin Lodha},
  title        = {WiP: QoS Based Recommendation System for Efficient Private Inference
                  of {CNN} Using {FHE}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  pages        = {198--211},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/iciss/SoodSH21,
  author       = {Shaurya Sood and
                  Manash Saikia and
                  Neminath Hubballi},
  title        = {WiP: Slow Rate {HTTP} Attack Detection with Behavioral Parameters},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  pages        = {26--37},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/iciss/SyedSENTB21,
  author       = {Habeeb Syed and
                  Imtiyazuddin Shaik and
                  Nitesh Emmadi and
                  Harika Narumanchi and
                  Meena Singh Dilip Thakur and
                  Rajan Mindigal Alasingara Bhattachar},
  title        = {WiP: Privacy Enabled Biometric Authentication Based on Proof of Decryption
                  Techniques},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  pages        = {185--197},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/iciss/TakeshigeKT21,
  author       = {Amane Takeshige and
                  Haruhisa Kosuge and
                  Hidema Tanaka},
  title        = {Experimental Verification of Estimated Block Size of {BKZ} Algorithm
                  Against {LWE}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  pages        = {173--184},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/iciss/VermaMD21,
  author       = {Pranav Verma and
                  Anish Mathuria and
                  Sourish Dasgupta},
  title        = {Faster Private Rating Update via Integer-Based Homomorphic Encryption},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  pages        = {218--236},
  publisher    = {Springer},
  year         = {2021}
}
@proceedings{DBLP:conf/iciss/2021,
  editor       = {Somanath Tripathy and
                  Rudrapatna K. Shyamasundar and
                  Rajiv Ranjan},
  title        = {Information Systems Security - 17th International Conference, {ICISS}
                  2021, Patna, India, December 16-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/iciss/BuiS20,
  author       = {Thang Bui and
                  Scott D. Stoller},
  title        = {Learning Attribute-Based and Relationship-Based Access Control Policies
                  with Unknown Values},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {23--44},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/iciss/ChouguleTL20,
  author       = {Abhijeet Chougule and
                  Harshal Tupsamudre and
                  Sachin Lodha},
  title        = {Revelio: {A} Lightweight Captcha Solver Using a Dictionary Based Approach},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {97--116},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/iciss/DuttaK20,
  author       = {Abir Dutta and
                  Shri Kant},
  title        = {An Overview of Cyber Threat Intelligence Platform and Role of Artificial
                  Intelligence and Machine Learning},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {81--86},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/iciss/DuttaSARS20,
  author       = {Sabyasachi Dutta and
                  Md Kutubuddin Sardar and
                  Avishek Adhikari and
                  Sushmita Ruj and
                  Kouichi Sakurai},
  title        = {Color Visual Cryptography Schemes Using Linear Algebraic Techniques
                  over Rings},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {198--217},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/iciss/GaoN20,
  author       = {Yansong Gao and
                  Surya Nepal},
  title        = {A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {69--80},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/iciss/GargB20,
  author       = {Shivi Garg and
                  Niyati Baliyan},
  title        = {Machine Learning Based Android Vulnerability Detection: {A} Roadmap},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {87--93},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/iciss/KumarKP20,
  author       = {Sudesh Kumar and
                  Lakshmi Jayant Kittur and
                  Alwyn Roshan Pais},
  title        = {Attacks on Android-Based Smartphones and Impact of Vendor Customization
                  on Android {OS} Security},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {241--252},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/iciss/LeszczynaL20,
  author       = {Rafal Leszczyna and
                  Adrian Litwin},
  title        = {Estimating the Cost of Cybersecurity Activities with CAsPeA: {A} Case
                  Study and Comparative Analysis},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {267--287},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/iciss/MishraS20,
  author       = {Saurabh Mishra and
                  Debanjan Sadhya},
  title        = {LiARX: {A} Lightweight Cipher Based on the {LTS} Design Strategy of
                  {ARX}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {185--197},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/iciss/MondalPKN20,
  author       = {Sobhan Mondal and
                  Deependra Pushkar and
                  Mrinali Kumari and
                  Ruchira Naskar},
  title        = {Forensic Source Identification of {OSN} Compressed Images},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {160--166},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/iciss/PiroccaAZ20,
  author       = {Simone Pirocca and
                  Luca Allodi and
                  Nicola Zannone},
  title        = {A Toolkit for Security Awareness Training Against Targeted Phishing},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {137--159},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/iciss/PramanikD0A20,
  author       = {Jyotirmoy Pramanik and
                  Sabyasachi Dutta and
                  Partha Sarathi Roy and
                  Avishek Adhikari},
  title        = {Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {169--184},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/iciss/ShahN20,
  author       = {Ryan Shah and
                  Shishir Nagaraja},
  title        = {A Unified Access Control Model for Calibration Traceability in Safety-Critical
                  IoT},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/iciss/TanakaF20,
  author       = {Hidema Tanaka and
                  Keisuke Fukushima},
  title        = {Secure Calculation for Position Information of IoT Device with Few
                  Communication and Small Secret Information},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {221--240},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/iciss/Theuermann20,
  author       = {Kevin Theuermann},
  title        = {Reliability and Security for Safety-Critical Service Compositions},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {45--65},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/iciss/UplavikarV0J20,
  author       = {Nitish M. Uplavikar and
                  Jaideep Vaidya and
                  Dan Lin and
                  Wei Jiang},
  title        = {Privacy-Preserving Friend Recommendation in an Integrated Social Environment},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {117--136},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/iciss/VermaMS20,
  author       = {Vinita Verma and
                  Sunil Kumar Muttoo and
                  V. B. Singh},
  title        = {Detection of Malign and Benign {PE} Files Using Texture Analysis},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {253--266},
  publisher    = {Springer},
  year         = {2020}
}
@proceedings{DBLP:conf/iciss/2020,
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/iciss/AcharyaPT19,
  author       = {Anasuya Acharya and
                  Manoj Prabhakaran and
                  Akash Trehan},
  title        = {An Introduction to the CellTree Paradigm (Invited Paper)},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {137--153},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/BatraAVS19,
  author       = {Gunjan Batra and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya and
                  Shamik Sural},
  title        = {Policy Reconciliation and Migration in Attribute Based Access Control},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {99--120},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/BopcheRRM19,
  author       = {Ghanshyam S. Bopche and
                  Gopal N. Rai and
                  B. Ramachandra Reddy and
                  Babu M. Mehtre},
  title        = {Differential Attack Graph-Based Approach for Assessing Change in the
                  Network Attack Surface},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {324--344},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/DalaiP19,
  author       = {Deepak Kumar Dalai and
                  Santu Pal},
  title        = {Wip: Degree Evaluation of Grain-v1},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {239--251},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/DasSVAR19,
  author       = {Saptarshi Das and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Gerhard Rigoll},
  title        = {VisMAP: Visual Mining of Attribute-Based Access Control Policies},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {79--98},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/DubeyRSM19,
  author       = {Aditya Dubey and
                  Uttara Ravi and
                  Somya Sharma and
                  Barsha Mitra},
  title        = {Toward Implementing Spatio-Temporal {RBAC} Extensions},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {59--78},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/FatimaI19,
  author       = {Eram Fatima and
                  Saiful Islam},
  title        = {A New High Capacity and Reversible Data Hiding Technique for Images},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {290--304},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/GangwarR19,
  author       = {Akhilesh Gangwar and
                  Vadlamani Ravi},
  title        = {WiP: Generative Adversarial Network for Oversampling Data in Credit
                  Card Fraud Detection},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {123--134},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/HaglundG19,
  author       = {Jonas Haglund and
                  Roberto Guanciale},
  title        = {Trustworthy Isolation of {DMA} Enabled Devices},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {35--55},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/HorandnerN19,
  author       = {Felix H{\"{o}}randner and
                  Franco Nieddu},
  title        = {Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound Keys},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {196--217},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/HorandnerRR19,
  author       = {Felix H{\"{o}}randner and
                  Sebastian Ramacher and
                  Simon Roth},
  title        = {Selective End-To-End Data-Sharing in the Cloud},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {175--195},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/JishaM19,
  author       = {T. E. Jisha and
                  Thomas Monoth},
  title        = {WiP: Security Enhanced Size Invariant Visual Cryptography with Perfect
                  Reconstruction of White Pixels},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {279--289},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/KadhiwalaP19,
  author       = {Bintu Kadhiwala and
                  Sankita J. Patel},
  title        = {A Novel k-Anonymization Approach to Prevent Insider Attack in Collaborative
                  Social Network Data Publishing},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {255--275},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/MandalD19,
  author       = {Arkaprava Bhaduri Mandal and
                  Tanmoy Kanti Das},
  title        = {Anti-forensics of a {NAD-JPEG} Detection Scheme Using Estimation of
                  {DC} Coefficients},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {307--323},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/NorooziSKI19,
  author       = {Ali A. Noroozi and
                  Khayyam Salehi and
                  Jaber Karimpour and
                  Ayaz Isazadeh},
  title        = {Secure Information Flow Analysis Using the {PRISM} Model Checker},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {154--172},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/PalLS19,
  author       = {Priyanka Pal and
                  Sudharsana K. J. L. and
                  Rohith Balaji S.},
  title        = {WiP: Criminal Smart Contract for Private Key Theft in End to End Encrypted
                  Applications},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {21--32},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/PalmaGVM19,
  author       = {Lucas M. Palma and
                  Fernanda Oliveira Gomes and
                  Mart{\'{\i}}n A. Gagliotti Vigil and
                  Jean Everson Martina},
  title        = {A Transparent and Privacy-Aware Approach Using Smart Contracts for
                  Car Insurance Reward Programs},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/VermaMD19,
  author       = {Pranav Verma and
                  Anish Mathuria and
                  Sourish Dasgupta},
  title        = {Item-Based Privacy-Preserving Recommender System with Offline Users
                  and Reduced Trust Requirements},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {218--238},
  publisher    = {Springer},
  year         = {2019}
}
@proceedings{DBLP:conf/iciss/2019,
  editor       = {Deepak Garg and
                  N. V. Narendra Kumar and
                  Rudrapatna K. Shyamasundar},
  title        = {Information Systems Security - 15th International Conference, {ICISS}
                  2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iciss/AdityaGL18,
  author       = {K. Aditya and
                  Slawomir Grzonkowski and
                  Nhien{-}An Le{-}Khac},
  title        = {RiskWriter: Predicting Cyber Risk of an Enterprise},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {88--106},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/BakasN18,
  author       = {Jamimamul Bakas and
                  Ruchira Naskar},
  title        = {A Digital Forensic Technique for Inter-Frame Video Forgery Detection
                  Based on 3D {CNN}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {304--317},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/BakasRKN18,
  author       = {Jamimamul Bakas and
                  Praneta Rawat and
                  Kalyan Kokkalla and
                  Ruchira Naskar},
  title        = {Re-compression Based {JPEG} Tamper Detection and Localization Using
                  Deep Neural Network, Eliminating Compression Factor Dependency},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {318--341},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/BopcheRMG18,
  author       = {Ghanshyam S. Bopche and
                  Gopal N. Rai and
                  Babu M. Mehtre and
                  G. R. Gangadharan},
  title        = {Modeling and Analyzing Multistage Attacks Using Recursive Composition
                  Algebra},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {67--87},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/BoyerCCQD18,
  author       = {Kirk Boyer and
                  Hao Chen and
                  Jingwei Chen and
                  Jian Qiu and
                  Rinku Dewri},
  title        = {A Characterization of the Mass Surveillance Potential of Road Traffic
                  Monitors},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/Chatterjee18,
  author       = {Sumanta Chatterjee},
  title        = {Secure Moderated Bargaining Game},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {209--227},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/DasKSY18,
  author       = {Sourav Das and
                  Aashish Kolluri and
                  Prateek Saxena and
                  Haifeng Yu},
  title        = {(Invited Paper) on the Security of Blockchain Consensus Protocols},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {465--480},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/Es-SalhiEC18,
  author       = {Khaoula Es{-}Salhi and
                  David Espes and
                  Nora Cuppens},
  title        = {{SONICS:} {A} Segmentation Method for Integrated {ICS} and Corporate
                  System},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {231--250},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/GhosalC18,
  author       = {Riddhi Ghosal and
                  Sanjit Chatterjee},
  title        = {Privacy Preserving Multi-server k-means Computation over Horizontally
                  Partitioned Data},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {189--208},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/KabilDCCHP18,
  author       = {Alexandre Kabil and
                  Thierry Duval and
                  Nora Cuppens and
                  G{\'{e}}rard Le Comte and
                  Yoran Halgand and
                  Christophe Ponchel},
  title        = {From Cyber Security Activities to Collaborative Virtual Environments
                  Practices Through the 3D CyberCOP Platform},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {272--287},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/KishoreKR18,
  author       = {Sreesh Kishore and
                  Renuka Kumar and
                  Sreeranga Rajan},
  title        = {Towards Accuracy in Similarity Analysis of Android Applications},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {146--167},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/MarsalekPSZ18,
  author       = {Alexander Marsalek and
                  Bernd Pr{\"{u}}nster and
                  Bojan Suzic and
                  Thomas Zefferer},
  title        = {SeDiCom: {A} Secure Distributed Privacy-Preserving Communication Platform},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {345--363},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/MilajerdiEGV18,
  author       = {Sadegh M. Milajerdi and
                  Birhanu Eshete and
                  Rigel Gjomemo and
                  Venkat N. Venkatakrishnan},
  title        = {ProPatrol: Attack Investigation via Extracted High-Level Tasks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {107--126},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/NimmySA18,
  author       = {K. Nimmy and
                  Sriram Sankaran and
                  Krishnashree Achuthan},
  title        = {A Novel Multi-factor Authentication Protocol for Smart Home Environments},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {44--63},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/PandaKM18,
  author       = {Suryakanta Panda and
                  Madhu Kumari and
                  Samrat Mondal},
  title        = {{SGP:} {A} Safe Graphical Password System Resisting Shoulder-Surfing
                  Attack on Smartphones},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {129--145},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/PandaM18,
  author       = {Suryakanta Panda and
                  Samrat Mondal},
  title        = {drPass: {A} Dynamic and Reusable Password Generator Protocol},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {407--426},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/PareekP18,
  author       = {Gaurav Pareek and
                  B. R. Purushothama},
  title        = {Proxy Re-Encryption Scheme for Access Control Enforcement Delegation
                  on Outsourced Data in Public Cloud},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {251--271},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/PathaniaRS18,
  author       = {Amit Pathania and
                  B. S. Radhika and
                  Rudrapatna K. Shyamasundar},
  title        = {MySecPol: {A} Client-Side Policy Language for Safe and Secure Browsing},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {427--447},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/PatilS18,
  author       = {Vishwas T. Patil and
                  R. K. Shyamasundar},
  title        = {Efficacy of GDPR's Right-to-be-Forgotten on Facebook},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {364--385},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/PatilVS18,
  author       = {Bhagyesh V. Patil and
                  Parjanya Vyas and
                  R. K. Shyamasundar},
  title        = {SecSmartLock: An Architecture and Protocol for Designing Secure Smart
                  Locks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {24--43},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/PramanikRDAS18,
  author       = {Jyotirmoy Pramanik and
                  Partha Sarathi Roy and
                  Sabyasachi Dutta and
                  Avishek Adhikari and
                  Kouichi Sakurai},
  title        = {Secret Sharing Schemes on Compartmental Access Structure in Presence
                  of Cheaters},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {171--188},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/RajputG18,
  author       = {Ajinkya Rajput and
                  K. Gopinath},
  title        = {Analysis of Newer Aadhaar Privacy Models},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {386--404},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/SameerDN18,
  author       = {Venkata Udaya Sameer and
                  Ishaan Dali and
                  Ruchira Naskar},
  title        = {A Deep Learning Based Digital Forensic Solution to Blind Source Identification
                  of Facebook Images},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {291--303},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/TiwariP18,
  author       = {Abhishek Tiwari and
                  Rajarshi Pal},
  title        = {Gaze-Based Graphical Password Using Webcam},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  pages        = {448--461},
  publisher    = {Springer},
  year         = {2018}
}
@proceedings{DBLP:conf/iciss/2018,
  editor       = {Vinod Ganapathy and
                  Trent Jaeger and
                  R. K. Shyamasundar},
  title        = {Information Systems Security - 14th International Conference, {ICISS}
                  2018, Bangalore, India, December 17-19, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11281},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iciss/AgrawallMBC17,
  author       = {Akash Agrawall and
                  Shubh Maheshwari and
                  Projit Bandyopadhyay and
                  Venkatesh Choppella},
  title        = {Modelling and Mitigation of Cross-Origin Request Attacks on Federated
                  Identity Management Using Cross Origin Request Policy},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {263--282},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/BayouECC17,
  author       = {Lyes Bayou and
                  David Espes and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {wIDS: {A} Multilayer {IDS} for Wireless-Based {SCADA} Systems},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {387--404},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/BkakriaGCCL17,
  author       = {Anis Bkakria and
                  Mariem Graa and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Jean{-}Louis Lanet},
  title        = {Experimenting Similarity-Based Hijacking Attacks Detection and Response
                  in Android Systems},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {127--145},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/ChaudhariDD17,
  author       = {Payal Chaudhari and
                  Manik Lal Das and
                  Dipankar Dasgupta},
  title        = {Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {88--103},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/DasBSS17,
  author       = {Moumita Das and
                  Ansuman Banerjee and
                  Nitesh K. Singh and
                  Bhaskar Sardar},
  title        = {Performance Attacks on Branch Predictors in Embedded Processors with
                  {SMT} Support},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {313--322},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/DaveSFLG17,
  author       = {Jay Dave and
                  Shweta Saharan and
                  Parvez Faruki and
                  Vijay Laxmi and
                  Manoj Singh Gaur},
  title        = {Secure Random Encryption for Deduplicated Storage},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {164--176},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/GargM17,
  author       = {Varun Garg and
                  Anish Mathuria},
  title        = {On Automated Detection of Multi-Protocol Attacks Using {AVISPA}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {179--193},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/HonapL17,
  author       = {Amrita Milind Honap and
                  Wonjun Lee},
  title        = {Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented
                  Programming},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {107--126},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/KhanJGN17,
  author       = {Mohsin Khan and
                  Kimmo J{\"{a}}rvinen and
                  Philip Ginzboorg and
                  Valtteri Niemi},
  title        = {On De-synchronization of User Pseudonyms in Mobile Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {347--366},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/KomeGCCF17,
  author       = {Marco Lobe Kome and
                  Mariem Graa and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Vincent Frey},
  title        = {DIscovery and REgistration Protocol - For Device and Person Identity
                  Management in IoT},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {243--262},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/KoshleyRH17,
  author       = {Dileep Kumar Koshley and
                  Sapana Rani and
                  Raju Halder},
  title        = {Towards Generalization of Privacy Policy Specification and Property-Based
                  Information Leakage},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {68--87},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/KumarKS17,
  author       = {Mahender Kumar and
                  Chittaranjan Padmanabha Katti and
                  Prem Chandra Saxena},
  title        = {A Secure Anonymous E-Voting System Using Identity-Based Blind Signature
                  Scheme},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {29--49},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/KumarRSG17,
  author       = {Vineet Kumar and
                  Aneek Roy and
                  Sourya Sengupta and
                  Sourav Sen Gupta},
  title        = {Parallelized Common Factor Attack on {RSA}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {303--312},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/ManciniMP17,
  author       = {Luigi V. Mancini and
                  Andrea Monti and
                  Agostino Panico},
  title        = {{SOF} on Trial. The Technical and Legal Value of Battlefield Digital
                  Forensics in Court},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {9--26},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/MimuraT17,
  author       = {Mamoru Mimura and
                  Hidema Tanaka},
  title        = {Heavy Log Reader: Learning the Context of Cyber Attacks Automatically
                  with Paragraph Vector},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {146--163},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/MunkhbaatarMT17,
  author       = {Bold Munkhbaatar and
                  Mamoru Mimura and
                  Hidema Tanaka},
  title        = {Dark Domain Name Attack: {A} New Threat to Domain Name System},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {405--414},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/NayakT17,
  author       = {Sanjeet Kumar Nayak and
                  Somanath Tripathy},
  title        = {{SEMFS:} Secure and Efficient Multi-keyword Fuzzy Search for Cloud
                  Storage},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {50--67},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/NguyenMT17,
  author       = {Son Duc Nguyen and
                  Mamoru Mimura and
                  Hidema Tanaka},
  title        = {Leveraging Man-in-the-middle DoS Attack with Internal {TCP} Retransmissions
                  in Virtual Network},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {367--386},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/RaiDNM17,
  author       = {Sandeep Rai and
                  Rushang Dhanesha and
                  Sreyans Nahata and
                  Bernard Menezes},
  title        = {Malicious Application Detection on Android Smartphones with Enhanced
                  Static-Dynamic Analysis},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {194--208},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/RajputG17,
  author       = {Ajinkya Rajput and
                  K. Gopinath},
  title        = {Towards a More Secure Aadhaar},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {283--300},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/RaoP17,
  author       = {Routhu Srinivasa Rao and
                  Alwyn Roshan Pais},
  title        = {An Enhanced Blacklist Method to Detect Phishing Websites},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {323--333},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/RathAS17,
  author       = {Mayukh Rath and
                  Shivali Agarwal and
                  R. K. Shyamasundar},
  title        = {Semi Supervised {NLP} Based Classification of Malware Documents},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {334--344},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/SanthanamHKR17,
  author       = {Ganesh Ram Santhanam and
                  Benjamin Holland and
                  Suresh C. Kothari and
                  Nikhil Ranade},
  title        = {Human-on-the-Loop Automation for Detecting Software Side-Channel Vulnerabilities},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {209--230},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/TrivediD17,
  author       = {Nachiket Trivedi and
                  Manik Lal Das},
  title        = {MalDetec: {A} Non-root Approach for Dynamic Malware Detection in Android},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {231--240},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/Zatti17,
  author       = {Stefano Zatti},
  title        = {The Protection of Space Missions: Threats and Cyber Threats},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {3--8},
  publisher    = {Springer},
  year         = {2017}
}
@proceedings{DBLP:conf/iciss/2017,
  editor       = {Rudrapatna K. Shyamasundar and
                  Virendra Singh and
                  Jaideep Vaidya},
  title        = {Information Systems Security - 13th International Conference, {ICISS}
                  2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/iciss/BagadeR16,
  author       = {Sudhir Bagade and
                  Vijay T. Raisinghani},
  title        = {{JITWORM:} Jitter Monitoring Based Wormhole Attack Detection in {MANET}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {444--458},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/BarikMG16,
  author       = {Mridul Sankar Barik and
                  Chandan Mazumdar and
                  Amarnath Gupta},
  title        = {Network Vulnerability Analysis Using a Constrained Graph Data Model},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {263--282},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/CanardT16,
  author       = {S{\'{e}}bastien Canard and
                  Viet Cuong Trinh},
  title        = {An Efficient Certificateless Signature Scheme in the Standard Model},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {175--192},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/CanardT16a,
  author       = {S{\'{e}}bastien Canard and
                  Viet Cuong Trinh},
  title        = {Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel
                  Broadcast Encryption},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {193--211},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/ChallaG16,
  author       = {RatnaKumari Challa and
                  VijayaKumari Gunta},
  title        = {Reed-Muller Code Based Symmetric Key Fully Homomorphic Encryption
                  Scheme},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {499--508},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/ChamotraSRs16,
  author       = {Saurabh Chamotra and
                  Rakesh Kumar Sehgal and
                  Sanjeev Ror and
                  Bhupendra Singh},
  title        = {Honeypot Deployment in Broadband Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {479--488},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/ChorgheS16,
  author       = {Sharvari Prakash Chorghe and
                  Narendra Shekokar},
  title        = {A Solution to Detect Phishing in Android Devices},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {461--470},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/DeshmukhNA16,
  author       = {Maroti Deshmukh and
                  Neeta Nain and
                  Mushtaq Ahmed},
  title        = {Enhanced Modulo Based Multi Secret Image Sharing Scheme},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {212--224},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/DessaiK16,
  author       = {Kissan G. Gauns Dessai and
                  Venkatesh V. Kamat},
  title        = {A Framework for Analyzing Associativity and Anonymity in Conventional
                  and Electronic Summative Examinations},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {303--323},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/EssaouiniCC16,
  author       = {Nada Essaouini and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  title        = {Building a Fair System Using Access Rights},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {89--108},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/GajeraND16,
  author       = {Hardik Gajera and
                  Shruti Naik and
                  Manik Lal Das},
  title        = {On the Security of "Verifiable Privacy-Preserving Monitoring for Cloud-Assisted
                  mHealth Systems"},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {324--335},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/GhoshalP16,
  author       = {Sanat Ghoshal and
                  Goutam Paul},
  title        = {Exploiting Block-Chain Data Structure for Auditorless Auditing on
                  Cloud Data},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {359--371},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/HarshaAS16,
  author       = {T. Harsha and
                  S. Asha and
                  B. Soniya},
  title        = {Feature Selection for Effective Botnet Detection Based on Periodicity
                  of Traffic},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {471--478},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/HartogZ16,
  author       = {Jerry den Hartog and
                  Nicola Zannone},
  title        = {Collaborative Access Decisions: Why Has My Decision Not Been Enforced?},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {109--130},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/HawannaKRJ16,
  author       = {Varsharani Hawanna and
                  Vrushali Y. Kulkarni and
                  Rashmi Rane and
                  Pooja Joshi},
  title        = {Risk Evaluation of {X.509} Certificates - {A} Machine Learning Application},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {372--389},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/JainCRS16,
  author       = {Lokesh Jain and
                  Aditya Chandran and
                  Sanjay Rawat and
                  Kannan Srinathan},
  title        = {Discovering Vulnerable Functions by Extrapolation: {A} Control-Flow
                  Graph Similarity Based Approach},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {532--542},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/JainGLM16,
  author       = {Vineeta Jain and
                  Manoj Singh Gaur and
                  Vijay Laxmi and
                  Mohamed Mosbah},
  title        = {Detection of SQLite Database Vulnerabilities in Android Apps},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {521--531},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/JanaH16,
  author       = {Angshuman Jana and
                  Raju Halder},
  title        = {Defining Abstract Semantics for Static Dependence Analysis of Relational
                  Database Applications},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {151--171},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/JangiralaMM16,
  author       = {Srinivas Jangirala and
                  Dheerendra Mishra and
                  Sourav Mukhopadhyay},
  title        = {Secure Lightweight User Authentication and Key Agreement Scheme for
                  Wireless Sensor Networks Tailored for the Internet of Things Environment},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {45--65},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/KarN16,
  author       = {Jayaprakash Kar and
                  Kshirasagar Naik},
  title        = {Generic Construction of Certificateless Signcryption Scheme},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {489--498},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/KongsgardNME16,
  author       = {Kyrre Wahl Kongsg{\aa}rd and
                  Nils Agne Nordbotten and
                  Federico Mancini and
                  Paal E. Engelstad},
  title        = {Data Loss Prevention Based on Text Classification in Controlled Environments},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {131--150},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/KukkalaSI16,
  author       = {Varsha Bhat Kukkala and
                  Jaspal Singh Saini and
                  S. R. S. Iyengar},
  title        = {Privacy Preserving Network Analysis of Distributed Social Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {336--355},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/MaheshwariM16,
  author       = {Ankit Maheshwari and
                  Samrat Mondal},
  title        = {{SPOSS:} Secure Pin-Based-Authentication Obviating Shoulder Surfing},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {66--86},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/MukherjeeSRDG16,
  author       = {Subhojeet Mukherjee and
                  Hossein Shirazi and
                  Indrakshi Ray and
                  Jeremy Daily and
                  Rose F. Gamble},
  title        = {Practical DoS Attacks on Embedded Networks in Commercial Vehicles},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/NandaNHJ16,
  author       = {Ashish Nanda and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Aruna Jamdagni},
  title        = {A Secure Routing Scheme for Wireless Mesh Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {393--408},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/SameerSN16,
  author       = {Venkata Udaya Sameer and
                  S. Sugumaran and
                  Ruchira Naskar},
  title        = {Digital Forensic Source Camera Identification with Efficient Feature
                  Selection Using Filter, Wrapper and Hybrid Approaches},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {409--425},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/SheelaST16,
  author       = {S. J. Sheela and
                  K. V. Suresh and
                  Deepaknath Tandur},
  title        = {Performance Evaluation of Modified Henon Map in Image Encryption},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {225--240},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/SilvaRSM16,
  author       = {Douglas Sim{\~{o}}es Silva and
                  Davi Resner and
                  Rick Lopes de Souza and
                  Jean Everson Martina},
  title        = {Formal Verification of a Cross-Layer, Trustful Space-Time Protocol
                  for Wireless Sensor Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {426--443},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/SinghTB16,
  author       = {Surendra Singh and
                  Sachin Tripathi and
                  Suvadip Batabyal},
  title        = {Secured Dynamic Scheduling Algorithm for Real-Time Applications on
                  Grid},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {283--300},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/Tanaka16,
  author       = {Hidema Tanaka},
  title        = {Network Counter-Attack Strategy by Topology Map Analysis},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {243--262},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/TeichelSM16,
  author       = {Kristof Teichel and
                  Dieter Sibold and
                  Stefan Milius},
  title        = {An Attack Possibility on Time Synchronization Protocols Secured with
                  TESLA-Like Mechanisms},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/YukselHE16,
  author       = {{\"{O}}mer Y{\"{u}}ksel and
                  Jerry den Hartog and
                  Sandro Etalle},
  title        = {Towards Useful Anomaly Detection for Back Office Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {509--520},
  publisher    = {Springer},
  year         = {2016}
}
@proceedings{DBLP:conf/iciss/2016,
  editor       = {Indrajit Ray and
                  Manoj Singh Gaur and
                  Mauro Conti and
                  Dheeraj Sanghi and
                  V. Kamakoti},
  title        = {Information Systems Security - 12th International Conference, {ICISS}
                  2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/iciss/AgrawalDMS15,
  author       = {Sarita Agrawal and
                  Manik Lal Das and
                  Anish Mathuria and
                  Sanjay Srivastava},
  title        = {Program Integrity Verification for Detecting Node Capture Attack in
                  Wireless Sensor Network},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {419--440},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/BanerjeeMR15,
  author       = {Satyajit Banerjee and
                  Debapriyay Mukhopadhyay and
                  Suman Roy},
  title        = {A New Threshold Certification Scheme Based Defense Against Sybil Attack
                  for Sensor Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {562--572},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/BennettRF15,
  author       = {Phillipa Bennett and
                  Indrakshi Ray and
                  Robert B. France},
  title        = {Modeling of Online Social Network Policies Using an Attribute-Based
                  Access Control Framework},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {79--97},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/BhattacharjeeM15,
  author       = {Suchismita Bhattacharjee and
                  Ningrinla Marchang},
  title        = {Attack-Resistant Trust-Based Weighted Majority Game Rule for Spectrum
                  Sensing in Cognitive Radio Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {441--460},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/BollmannLMS15,
  author       = {Dominik Bollmann and
                  Steffen Lortz and
                  Heiko Mantel and
                  Artem Starostin},
  title        = {An Automatic Inference of Minimal Security Types},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {395--415},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/ChangSS15,
  author       = {Donghoon Chang and
                  Somitra Kumar Sanadhya and
                  Nishant Sharma},
  title        = {New {HMAC} Message Patches: Secret Patch and CrOw Patch},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {285--302},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/ChaudhariDM15,
  author       = {Payal Chaudhari and
                  Manik Lal Das and
                  Anish Mathuria},
  title        = {On Anonymous Attribute Based Encryption},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {378--392},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/Choudhury15,
  author       = {Ashish Choudhury},
  title        = {Asynchronous Error-Decodable Secret-Sharing and Its Application},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {364--377},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/DasA15,
  author       = {Angsuman Das and
                  Avishek Adhikari},
  title        = {Plaintext Checkable Signcryption},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {324--333},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/DasSB15,
  author       = {Moumita Das and
                  Bhaskar Sardar and
                  Ansuman Banerjee},
  title        = {Attacks on Branch Predictors: An Empirical Exploration},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {511--520},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/DeeringSK15,
  author       = {Tom Deering and
                  Ganesh Ram Santhanam and
                  Suresh C. Kothari},
  title        = {FlowMiner: Automatic Summarization of Library Data-Flow for Malware
                  Analysis},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {171--191},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/Ganapathy15,
  author       = {Vinod Ganapathy},
  title        = {Reflections on the Self-service Cloud Computing Project},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {36--57},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/GanselSGFDRMK15,
  author       = {Simon Gansel and
                  Stephan Schnitzer and
                  Ahmad Gilbeau{-}Hammoud and
                  Viktor Friesen and
                  Frank D{\"{u}}rr and
                  Kurt Rothermel and
                  Christian Maih{\"{o}}fer and
                  Ulrich Kr{\"{a}}mer},
  title        = {Context-Aware Access Control in Novel Automotive {HMI} Systems},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {118--138},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/GodefroyTHM15,
  author       = {Erwan Godefroy and
                  Eric Totel and
                  Michel Hurfin and
                  Fr{\'{e}}d{\'{e}}ric Majorczyk},
  title        = {Assessment of an Automatic Correlation Rules Generator},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {207--224},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/JhaSAV15,
  author       = {Sadhana Jha and
                  Shamik Sural and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  title        = {Enforcing Separation of Duty in Attribute Based Access Control Systems},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {61--78},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/KandarD15,
  author       = {Shyamalendu Kandar and
                  Bibhas Chandra Dhara},
  title        = {A (k, n) Multi Secret Sharing Scheme Using Two Variable One Way Function
                  with Less Public Values},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {532--541},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/KosugeITK15,
  author       = {Haruhisa Kosuge and
                  Keisuke Iwai and
                  Hidema Tanaka and
                  Takakazu Kurokawa},
  title        = {Search Algorithm of Precise Integral Distinguisher of Byte-Based Block
                  Cipher},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {303--323},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/KunzFHP15,
  author       = {Michael Kunz and
                  Ludwig Fuchs and
                  Matthias Hummer and
                  G{\"{u}}nther Pernul},
  title        = {Introducing Dynamic Identity and Access Management in Organizations},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {139--158},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/LabatiGMPSS15,
  author       = {Ruggero Donida Labati and
                  Angelo Genovese and
                  Enrique Mu{\~{n}}oz Ballester and
                  Vincenzo Piuri and
                  Fabio Scotti and
                  Gianluca Sforza},
  title        = {Automated Border Control Systems: Biometric Challenges and Research
                  Trends},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {11--20},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/LiCCCFJ15,
  author       = {Yanhuang Li and
                  Nora Cuppens{-}Boulahia and
                  Jean{-}Michel Crom and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Vincent Frey and
                  Xiaoshu Ji},
  title        = {Similarity Measure for Security Policies in Service Provider Selection},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {227--242},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/MeenpalB15,
  author       = {Toshanlal Meenpal and
                  A. K. Bhattacharjee},
  title        = {Watermark Removal Attack Extended to Forgery Against Correlation-Based
                  Watermarking Schemes},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {463--479},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/MehtaSD15,
  author       = {Punit Mehta and
                  Jigar Sharda and
                  Manik Lal Das},
  title        = {SQLshield: Preventing {SQL} Injection Attacks by Modifying User Input
                  Data},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {192--206},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/MukherjeeDBD15,
  author       = {Imon Mukherjee and
                  Biswajita Datta and
                  Reeturaj Banerjee and
                  Srijan Das},
  title        = {{DWT} Difference Modulation Based Novel Steganographic Algorithm},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {573--582},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/ParaboschiBM15,
  author       = {Stefano Paraboschi and
                  Enrico Bacis and
                  Simone Mutti},
  title        = {Extending Mandatory Access Control Policies in Android},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {21--35},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/Paul15,
  author       = {Goutam Paul},
  title        = {Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible
                  Remedies},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {161--170},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/PrandlLP15,
  author       = {Stefan Prandl and
                  Mihai M. Lazarescu and
                  Duc{-}Son Pham},
  title        = {A Study of Web Application Firewall Solutions},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {501--510},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/PushkarGG15,
  author       = {Anant Pushkar and
                  Nirnay Ghosh and
                  Soumya K. Ghosh},
  title        = {A Statistical Approach to Detect Anomalous User Requests in SaaS Cloud-Centric
                  Collaborations},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {243--262},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/Rao15,
  author       = {Y. Sreenivasa Rao},
  title        = {Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
                  Schemes with Fast Decryption},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {521--531},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/RoyCN15,
  author       = {Aniket Roy and
                  Rajat Subhra Chakraborty and
                  Ruchira Naskar},
  title        = {Reversible Color Image Watermarking in the YCoCg-R Color Space},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {480--498},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/SaranaRSVA15,
  author       = {Prasuna Sarana and
                  Arindam Roy and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {Role Mining in the Presence of Separation of Duty Constraints},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {98--117},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/Sarkar15,
  author       = {Santanu Sarkar},
  title        = {A New Distinguisher on Grain v1 for 106 Rounds},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {334--344},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/SharmaJ15,
  author       = {Dhruti Sharma and
                  Devesh Jinwala},
  title        = {Functional Encryption in IoT E-Health Care System},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {345--363},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/ShyamS15,
  author       = {Radhey Shyam and
                  Yogendra Narain Singh},
  title        = {Robustness of Score Normalization in Multibiometric Systems},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {542--550},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/SomaniJTPGS15,
  author       = {Gaurav Somani and
                  Abhinav Johri and
                  Mohit Taneja and
                  Utkarsh Pyne and
                  Manoj Singh Gaur and
                  Dheeraj Sanghi},
  title        = {{DARAC:} DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {263--282},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/SusheelKS15,
  author       = {S. Susheel and
                  N. V. Narendra Kumar and
                  R. K. Shyamasundar},
  title        = {Enforcing Secure Data Sharing in Web Application Development Frameworks
                  Like Django Through Information Flow Control},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {551--561},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/VimercatiFS15,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Pierangela Samarati},
  title        = {Data Security Issues in Cloud Scenarios},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {3--10},
  publisher    = {Springer},
  year         = {2015}
}
@proceedings{DBLP:conf/iciss/2015,
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Information Systems Security - 11th International Conference, {ICISS}
                  2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/iciss/BasuMC14,
  author       = {Aditya Basu and
                  Anish Mathuria and
                  Nagendra Chowdary},
  title        = {Automatic Generation of Compact Alphanumeric Shellcodes for x86},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {399--410},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/BhattacharjeeSM14,
  author       = {Jaya Bhattacharjee and
                  Anirban Sengupta and
                  Chandan Mazumdar},
  title        = {A Formal Methodology for Modeling Threats to Enterprise Assets},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {149--166},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/BiskupP14,
  author       = {Joachim Biskup and
                  Marcel Preu{\ss}},
  title        = {Inference-Proof Data Publishing by Minimally Weakening a Database
                  Instance},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {30--49},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/BiswalPR14,
  author       = {Sumitra Biswal and
                  Goutam Paul and
                  Shashwat Raizada},
  title        = {Preserving Privacy in Location-Based Services Using Sudoku Structures},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {448--463},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/ChakrabortyM14,
  author       = {Nilesh Chakraborty and
                  Samrat Mondal},
  title        = {An Improved Methodology towards Providing Immunity against Weak Shoulder
                  Surfing Attack},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {298--317},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/ChoudhuryRS14,
  author       = {Hiten Choudhury and
                  Basav Roychoudhury and
                  Dilip Kr. Saikia},
  title        = {A Security Extension Providing User Anonymity and Relaxed Trust Requirement
                  in Non-3GPP Access to the {EPS}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {226--244},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/CybenkoJW014,
  author       = {George Cybenko and
                  Sushil Jajodia and
                  Michael P. Wellman and
                  Peng Liu},
  title        = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building
                  the Scientific Foundation},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/DecroixBJN14,
  author       = {Koen Decroix and
                  Denis Butin and
                  Joachim Jansen and
                  Vincent Naessens},
  title        = {Inferring Accountability from Trust Perceptions},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {69--88},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/DoanDNT14,
  author       = {Thong M. Doan and
                  Han N. Dinh and
                  Nam Tuan Nguyen and
                  Phuoc T. Tran},
  title        = {Location Obfuscation Framework for Training-Free Localization System},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {464--476},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/GayHM14,
  author       = {Richard Gay and
                  Jinwei Hu and
                  Heiko Mantel},
  title        = {CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic
                  Enforcement},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {378--398},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/GuptaG14,
  author       = {Puneet Gupta and
                  Phalguni Gupta},
  title        = {A Vein Biometric Based Authentication System},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {425--436},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/HalderDGM14,
  author       = {Biswajit Halder and
                  Rajkumar Darbar and
                  Utpal Garain and
                  Abhoy Chand Mondal},
  title        = {Analysis of Fluorescent Paper Pulps for Detecting Counterfeit Indian
                  Paper Money},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {411--424},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/HeorhiadiFRS14,
  author       = {Victor Heorhiadi and
                  Seyed Kaveh Fayaz and
                  Michael K. Reiter and
                  Vyas Sekar},
  title        = {{SNIPS:} {A} Software-Defined Approach for Scaling Intrusion Prevention
                  Systems via Offloading},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {9--29},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/JhaSVA14,
  author       = {Sadhana Jha and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {Temporal {RBAC} Security Analysis Using Logic Programming in the Presence
                  of Administrative Policies},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {129--148},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/KhanCBGP14,
  author       = {Wilayat Khan and
                  Stefano Calzavara and
                  Michele Bugliesi and
                  Willem De Groef and
                  Frank Piessens},
  title        = {Client Side Web Session Integrity as a Non-interference Property},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {89--108},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/LiDL14,
  author       = {Xiaolei Li and
                  Xinshu Dong and
                  Zhenkai Liang},
  title        = {A Usage-Pattern Perspective for Privacy Ranking of Android Apps},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {245--256},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/MalviyaN14,
  author       = {Pankaj Malviya and
                  Ruchira Naskar},
  title        = {Digital Forensic Technique for Double Compression Based {JPEG} Image
                  Forgery Detection},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {437--447},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/MayerVK14,
  author       = {Peter Mayer and
                  Melanie Volkamer and
                  Michaela Kauer},
  title        = {Authentication Schemes - Comparison and Effective Password Spaces},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {204--225},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/PadhyaJ14,
  author       = {Mukti Padhya and
                  Devesh Jinwala},
  title        = {A Novel Approach for Searchable {CP-ABE} with Hidden Ciphertext-Policy},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {167--184},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/PaulSM14,
  author       = {Goutam Paul and
                  Pratik Sarkar and
                  Sarbajit Mukherjee},
  title        = {Towards a More Democratic Mining in Bitcoins},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {185--203},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/RamanujamSS14,
  author       = {Ramaswamy Ramanujam and
                  Vaishnavi Sundararajan and
                  S. P. Suresh},
  title        = {Extending Dolev-Yao with Assertions},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {50--68},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/RovelliV14,
  author       = {Paolo Rovelli and
                  Ymir Vigfusson},
  title        = {{PMDS:} Permission-Based Malware Detection System},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {338--357},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/RoySM14,
  author       = {Arindam Roy and
                  Shamik Sural and
                  Arun Kumar Majumdar},
  title        = {Impact of Multiple t-t {SMER} Constraints on Minimum User Requirement
                  in {RBAC}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {109--128},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/SainiGLSC14,
  author       = {Anil Saini and
                  Manoj Singh Gaur and
                  Vijay Laxmi and
                  Tushar Singhal and
                  Mauro Conti},
  title        = {Privacy Leakage Attacks in Browsers by Colluding Extensions},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {257--276},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/TelikicherlaCB14,
  author       = {Krishna Chaitanya Telikicherla and
                  Venkatesh Choppella and
                  Bruhadeshwar Bezawada},
  title        = {{CORP:} {A} Browser Policy to Mitigate Web Infiltration Attacks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {277--297},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/ThakurV14,
  author       = {Tanmay Thakur and
                  Rakesh M. Verma},
  title        = {Catching Classical and Hijack-Based Phishing Attacks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {318--337},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/VernotteDLLPP14,
  author       = {Alexandre Vernotte and
                  Fr{\'{e}}d{\'{e}}ric Dadeau and
                  Franck Lebeau and
                  Bruno Legeard and
                  Fabien Peureux and
                  Fran{\c{c}}ois Piat},
  title        = {Efficient Detection of Multi-step Cross-Site Scripting Vulnerabilities},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {358--377},
  publisher    = {Springer},
  year         = {2014}
}
@proceedings{DBLP:conf/iciss/2014,
  editor       = {Atul Prakash and
                  Rudrapatna K. Shyamasundar},
  title        = {Information Systems Security - 10th International Conference, {ICISS}
                  2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/iciss/BagRR13,
  author       = {Samiran Bag and
                  Sushmita Ruj and
                  Bimal K. Roy},
  title        = {Jamming Resistant Schemes for Wireless Communication: {A} Combinatorial
                  Approach},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {43--62},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/ChaturvediMM13,
  author       = {Ankita Chaturvedi and
                  Dheerendra Mishra and
                  Sourav Mukhopadhyay},
  title        = {Improved Biometric-Based Three-factor Remote User Authentication Scheme
                  with Key Agreement Using Smart Card},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {63--77},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/CliftonA13,
  author       = {Chris Clifton and
                  Balamurugan Anandan},
  title        = {Challenges and Opportunities for Security with Differential Privacy},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/DasA13,
  author       = {Angsuman Das and
                  Avishek Adhikari},
  title        = {Signcryption from Randomness Recoverable {PKE} Revisited},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {78--90},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/DeP13,
  author       = {Sourya Joyee De and
                  Asim K. Pal},
  title        = {Auctions with Rational Adversary},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {91--105},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/DecroixLDN13,
  author       = {Koen Decroix and
                  Jorn Lapon and
                  Bart De Decker and
                  Vincent Naessens},
  title        = {A Framework for Formal Reasoning about Privacy Properties Based on
                  Trust Relationships in Complex Electronic Services},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {106--120},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/HachanaCCAM13,
  author       = {Safa{\`{a}} Hachana and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Vijay Atluri and
                  Stephane Morucci},
  title        = {Policy Mining: {A} Bottom-Up Approach toward a Model Based Firewall
                  Management},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/JaumeATM13,
  author       = {Mathieu Jaume and
                  Radoniaina Andriatsimandefitra and
                  Val{\'{e}}rie Viet Triem Tong and
                  Ludovic M{\'{e}}},
  title        = {Secure States versus Secure Executions - From Access Control to Flow
                  Control},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {148--162},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/KalutarageSZJ13,
  author       = {Harsha K. Kalutarage and
                  Siraj A. Shaikh and
                  Qin Zhou and
                  Anne E. James},
  title        = {Monitoring for Slow Suspicious Activities Using a Target Centric Approach},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {163--168},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/KerschbaumHKHSST13,
  author       = {Florian Kerschbaum and
                  Martin H{\"{a}}rterich and
                  Mathias Kohler and
                  Isabelle Hang and
                  Andreas Schaad and
                  Axel Schr{\"{o}}pfer and
                  Walter Tighzert},
  title        = {An Encrypted In-Memory Column-Store: The Onion Selection Problem},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {14--26},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/KhalidHCP13,
  author       = {Ayesha Khalid and
                  Muhammad Hassan and
                  Anupam Chattopadhyay and
                  Goutam Paul},
  title        = {RAPID-FeinSPN: {A} Rapid Prototyping Framework for Feistel and SPN-Based
                  Block Ciphers},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {169--190},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/KumarJGU13,
  author       = {Sheethal Kumar and
                  Pai B. J. Jaipal and
                  Sourav Sen Gupta and
                  Vigesh R. Ungrapalli},
  title        = {Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {199--213},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/KumarMD13,
  author       = {Naveen Kumar and
                  Anish Mathuria and
                  Manik Lal Das},
  title        = {Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme
                  - (Short Paper)},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {191--198},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/LorenziVSA13,
  author       = {David Lorenzi and
                  Jaideep Vaidya and
                  Shamik Sural and
                  Vijayalakshmi Atluri},
  title        = {Web Services Based Attacks against Image CAPTCHAs},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {214--229},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/MaitraG13,
  author       = {Subhamoy Maitra and
                  Sourav Sen Gupta},
  title        = {New Long-Term Glimpse of {RC4} Stream Cipher},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {230--238},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/MaityH13,
  author       = {Soumyadev Maity and
                  Ramesh C. Hansdah},
  title        = {A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection
                  Protocol for MANETs},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {239--246},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/MishraM13,
  author       = {Dheerendra Mishra and
                  Sourav Mukhopadhyay},
  title        = {Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement
                  Protocols},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {247--254},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/MizunoITK13,
  author       = {Hiroaki Mizuno and
                  Keisuke Iwai and
                  Hidema Tanaka and
                  Takakazu Kurokawa},
  title        = {Information Theoretical Analysis of Side-Channel Attack},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {255--269},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/MukherjeeBB13,
  author       = {Nabanita Mukherjee and
                  Ayon Bhattacharya and
                  Siddhartha Sekhar Bose},
  title        = {Evolutionary Multibit Grouping Steganographic Algorithm},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {285--296},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/MukherjeeP13,
  author       = {Imon Mukherjee and
                  Goutam Paul},
  title        = {Efficient Multi-bit Image Steganography in Spatial Domain},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {270--284},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/NgP13,
  author       = {Beng Heng Ng and
                  Atul Prakash},
  title        = {Let the Right One in: Discovering and Mitigating Permission Gaps},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {297--313},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/OktayKKM13,
  author       = {Kerim Yasin Oktay and
                  Vaibhav Khadilkar and
                  Murat Kantarcioglu and
                  Sharad Mehrotra},
  title        = {Risk Aware Approach to Data Confidentiality in Cloud Computing},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {27--42},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/PradweapH13,
  author       = {R. V. Pradweap and
                  R. C. Hansdah},
  title        = {A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication
                  {(RAHAA)} in {VANET}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {314--328},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/RaoD13,
  author       = {Y. Sreenivasa Rao and
                  Ratna Dutta},
  title        = {Recipient Anonymous Ciphertext-Policy Attribute Based Encryption},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {329--344},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/SarkarGM13,
  author       = {Santanu Sarkar and
                  Sourav Sen Gupta and
                  Subhamoy Maitra},
  title        = {Error Correction of Partially Exposed {RSA} Private Keys from {MSB}
                  Side},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {345--359},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/SaxenaGB13,
  author       = {Anuj Shanker Saxena and
                  Vikram Goyal and
                  Debajyoti Bera},
  title        = {Efficient Enforcement of Privacy for Moving Object Trajectories},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {360--374},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/SharmaSAV13,
  author       = {Manisha Sharma and
                  Shamik Sural and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  title        = {An Administrative Model for Spatio-Temporal Role Based Access Control},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {375--389},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/SobhdelJ13,
  author       = {Yasser Sobhdel and
                  Rasool Jalili},
  title        = {A UC-Secure Authenticated Contributory Group Key Exchange Protocol
                  Based on Discrete Logarithm},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {390--401},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/UmadeviS13,
  author       = {Ganugula Umadevi and
                  Ashutosh Saxena},
  title        = {Correctness Verification in Outsourced Databases: More Reliable Fake
                  Tuples Approach},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {121--132},
  publisher    = {Springer},
  year         = {2013}
}
@proceedings{DBLP:conf/iciss/2013,
  editor       = {Aditya Bagchi and
                  Indrakshi Ray},
  title        = {Information Systems Security - 9th International Conference, {ICISS}
                  2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciss/AgrawalRDML12,
  author       = {Sarita Agrawal and
                  Rodrigo Roman and
                  Manik Lal Das and
                  Anish Mathuria and
                  Javier L{\'{o}}pez},
  title        = {A Novel Key Update Protocol in Mobile Sensor Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {194--207},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/AmrutkarSVT12,
  author       = {Chaitrali Amrutkar and
                  Kapil Singh and
                  Arunabh Verma and
                  Patrick Traynor},
  title        = {VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {16--34},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/BhattacharyaDCIB12,
  author       = {Anup Kumar Bhattacharya and
                  Abhijit Das and
                  Dipanwita Roy Chowdhury and
                  Aravind Iyer and
                  Debojyoti Bhattacharya},
  title        = {Autonomous Certification with List-Based Revocation for Secure {V2V}
                  Communication},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {208--222},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/BijonKS12,
  author       = {Khalid Zaman Bijon and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  title        = {Risk-Aware {RBAC} Sessions},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {59--74},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/BoltonWZ12,
  author       = {Matthew L. Bolton and
                  Celeste M. Wallace and
                  Lenore D. Zuck},
  title        = {On Policies and Intents},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {104--118},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/ChandraY12,
  author       = {Girish Chandra and
                  Divakar Yadav},
  title        = {Verification of Money Atomicity in Digital Cash Based Payment System},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {249--264},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/GhasemiNHNJ12,
  author       = {Simin Ghasemi and
                  Morteza Noferesti and
                  Mohammad Ali Hadavi and
                  Sadegh Dorri Nogoorani and
                  Rasool Jalili},
  title        = {Correctness Verification in Database Outsourcing: {A} Trust-Based
                  Fake Tuples Approach},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {343--351},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/Hassan12,
  author       = {Doaa Hassan},
  title        = {Tracking Insecure Information Flows: {A} Prototype Evaluator in {ASF+SDF}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {310--326},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/HowladerKM12,
  author       = {Jaydeep Howlader and
                  Jayanta Kar and
                  Ashis Kumar Mal},
  title        = {Coercion Resistant {MIX} for Electronic Auction},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {238--248},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/Kruegel12,
  author       = {Christopher Kruegel},
  title        = {Fighting Malicious Software},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/LiPY12,
  author       = {Weihan Li and
                  Brajendra Panda and
                  Qussai Yaseen},
  title        = {Mitigating Insider Threat on Database Integrity},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/LorenziVUSA12,
  author       = {David Lorenzi and
                  Jaideep Vaidya and
                  Emre Uzun and
                  Shamik Sural and
                  Vijayalakshmi Atluri},
  title        = {Attacking Image Based CAPTCHAs Using Image Recognition Techniques},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {327--342},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/MaityG12,
  author       = {Soumya Maity and
                  Soumya Kanti Ghosh},
  title        = {A Cognitive Trust Model for Access Control Framework in {MANET}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {75--88},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/MaityH12,
  author       = {Soumyadev Maity and
                  Ramesh C. Hansdah},
  title        = {Certificate-Less On-Demand Public Key Management {(CLPKM)} for Self-organized
                  MANETs},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {277--293},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/MatamT12,
  author       = {Rakesh Matam and
                  Somanath Tripathy},
  title        = {Defence against Wormhole Attacks in Wireless Mesh Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {181--193},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/Naldurg12,
  author       = {Prasad Naldurg},
  title        = {Foundations of Dynamic Access Control},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {44--58},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/NaskarC12,
  author       = {Ruchira Naskar and
                  Rajat Subhra Chakraborty},
  title        = {Fuzzy Inference Rule Based Reversible Watermarking for Digital Images},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {149--163},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/NatarajanYZ12,
  author       = {Vivek Natarajan and
                  Yi Yang and
                  Sencun Zhu},
  title        = {Secure Trust Metadata Management for Mobile Ad-Hoc Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {164--180},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/OjamaaD12,
  author       = {Andres Ojamaa and
                  Karl D{\"{u}}{\"{u}}na},
  title        = {Security Assessment of Node.js Platform},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {35--43},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/PaulDMR12,
  author       = {Goutam Paul and
                  Ian Davidson and
                  Imon Mukherjee and
                  S. S. Ravi},
  title        = {Keyless Steganography in Spatial Domain Using \emph{Energetic} Pixels},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {134--148},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/PeinadoF12,
  author       = {Alberto Peinado and
                  Amparo F{\'{u}}ster{-}Sabater},
  title        = {Cryptographic Analysis of a Type of Sequence Generators},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {265--276},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/RaoD12,
  author       = {Y. Sreenivasa Rao and
                  Ratna Dutta},
  title        = {Computationally Efficient Secure Access Control for Vehicular Ad Hoc
                  Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {294--309},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/SwinnenSPP12,
  author       = {Arne Swinnen and
                  Raoul Strackx and
                  Pieter Philippaerts and
                  Frank Piessens},
  title        = {ProtoLeaks: {A} Reliable and Protocol-Independent Network Covert Channel},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {119--133},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/ToumiAC12,
  author       = {Khalifa Toumi and
                  C{\'{e}}sar Andr{\'{e}}s and
                  Ana R. Cavalli},
  title        = {Trust-orBAC: {A} Trust Access Control Model in Multi-Organization
                  Environments},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {89--103},
  publisher    = {Springer},
  year         = {2012}
}
@proceedings{DBLP:conf/iciss/2012,
  editor       = {Venkat N. Venkatakrishnan and
                  Diganta Goswami},
  title        = {Information Systems Security, 8th International Conference, {ICISS}
                  2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/iciss/AhmedRA11,
  author       = {Faraz Ahmed and
                  M. Zubair Rafique and
                  Muhammad Abulaish},
  title        = {A Data Mining Framework for Securing 3G Core Network from {GTP} Fuzzing
                  Attacks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {280--293},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/BanerjeeMBCN11,
  author       = {Prithu Banerjee and
                  Mahasweta Mitra and
                  Ferdous A. Barbhuiya and
                  Sandip Chakraborty and
                  Sukumar Nandi},
  title        = {An Efficient Decentralized Rekeying Scheme to Secure Hierarchical
                  Geographic Multicast Routing in Wireless Sensor Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {294--308},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/BasuSS11,
  author       = {Atanu Basu and
                  Indranil Sengupta and
                  Jamuna Kanta Sing},
  title        = {Secured Cloud Storage Scheme Using {ECC} Based Key Management in User
                  Hierarchy},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {175--189},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/BurghouwtSS11,
  author       = {Pieter Burghouwt and
                  Marcel E. M. Spruit and
                  Henk J. Sips},
  title        = {Towards Detection of Botnet Communication through Social Media by
                  Monitoring User Activity},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {131--143},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/CavallaroS11,
  author       = {Lorenzo Cavallaro and
                  R. Sekar},
  title        = {Taint-Enhanced Anomaly Detection},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {160--174},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/DasMPS11,
  author       = {Apurba Das and
                  Subhamoy Maitra and
                  Goutam Paul and
                  Santanu Sarkar},
  title        = {Some Combinatorial Results towards State Recovery Attack on {RC4}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {204--214},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/DattaBCDGJKS11,
  author       = {Anupam Datta and
                  Jeremiah Blocki and
                  Nicolas Christin and
                  Henry DeYoung and
                  Deepak Garg and
                  Limin Jia and
                  Dilsun Kirli Kaynar and
                  Arunesh Sinha},
  title        = {Understanding and Protecting Privacy: Formal Semantics and Principled
                  Audit Mechanisms},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {1--27},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/Enck11,
  author       = {William Enck},
  title        = {Defending Users against Smartphone Apps: Techniques and Future Directions},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {49--70},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/GadyatskayaLM11,
  author       = {Olga Gadyatskaya and
                  Eduardo Lostal and
                  Fabio Massacci},
  title        = {Load Time Security Verification},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {250--264},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/GeneiatakisPK11,
  author       = {Dimitris Geneiatakis and
                  Georgios Portokalidis and
                  Angelos D. Keromytis},
  title        = {A Multilayer Overlay Network Architecture for Enhancing {IP} Services
                  Availability against DoS},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {322--336},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/Goyal11,
  author       = {Vipul Goyal},
  title        = {Secure Composition of Cryptographic Protocols},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {71},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/GuptaS11,
  author       = {Indivar Gupta and
                  P. K. Saxena},
  title        = {Distributed Signcryption from Pairings},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {215--234},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/GuptaSX11,
  author       = {Puneet Gupta and
                  Scott D. Stoller and
                  Zhongyuan Xu},
  title        = {Abductive Analysis of Administrative Policies in Rule-Based Access
                  Control},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {116--130},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/HuangSEKS11,
  author       = {Yan Huang and
                  Chih{-}Hao Shen and
                  David Evans and
                  Jonathan Katz and
                  Abhi Shelat},
  title        = {Efficient Secure Computation with Garbled Circuits},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {28--48},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/JaumeTM11,
  author       = {Mathieu Jaume and
                  Val{\'{e}}rie Viet Triem Tong and
                  Ludovic M{\'{e}}},
  title        = {Flow Based Interpretation of Access Control: Detection of Illegal
                  Information Flows},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {72--86},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/KrishnanS11,
  author       = {Ram Krishnan and
                  Ravi S. Sandhu},
  title        = {Authorization Policy Specification and Enforcement for Group-Centric
                  Secure Information Sharing},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {102--115},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/KuhnhauserP11,
  author       = {Winfried E. K{\"{u}}hnhauser and
                  Anja P{\"{o}}lck},
  title        = {Towards Access Control Model Engineering},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {379--382},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/MaggiBSZ11,
  author       = {Federico Maggi and
                  Andrea Bellini and
                  Guido Salvaneschi and
                  Stefano Zanero},
  title        = {Finding Non-trivial Malware Naming Inconsistencies},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {144--159},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/NadkarniMP11,
  author       = {Tanusha S. Nadkarni and
                  Radhesh Mohandas and
                  Alwyn R. Pais},
  title        = {IFrandbox - Client Side Protection from Malicious Injected Iframes},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {383--386},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/NaskarC11,
  author       = {Ruchira Naskar and
                  Rajat Subhra Chakraborty},
  title        = {Reversible Image Watermarking through Coordinate Logic Operation Based
                  Prediction},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {190--203},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/NoferestiHJ11,
  author       = {Morteza Noferesti and
                  Mohammad Ali Hadavi and
                  Rasool Jalili},
  title        = {A Signature-Based Approach of Correctness Assurance in Data Outsourcing
                  Scenarios},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {374--378},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/RagavanP11,
  author       = {Harini Ragavan and
                  Brajendra Panda},
  title        = {Mitigation of Malicious Modifications by Insiders in Databases},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {337--351},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/SaxenaPGB11,
  author       = {Anuj Shanker Saxena and
                  Mayank Pundir and
                  Vikram Goyal and
                  Debajyoti Bera},
  title        = {Preserving Location Privacy for Continuous Queries on Known Route},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {265--279},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/SchneiderPE11,
  author       = {Christian A. Schneider and
                  Jonas Pfoh and
                  Claudia Eckert},
  title        = {A Universal Semantic Bridge for Virtual Machine Introspection},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {370--373},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/TedescoHS11,
  author       = {Filippo Del Tedesco and
                  Sebastian Hunt and
                  David Sands},
  title        = {A Semantic Hierarchy for Erasure Policies},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {352--369},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/ThomasCC11,
  author       = {Julien A. Thomas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  title        = {Consistency Policies for Dynamic Information Systems with Declassification
                  Flows},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {87--101},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/VeeningenWZ11,
  author       = {Meilof Veeningen and
                  Benne de Weger and
                  Nicola Zannone},
  title        = {Formal Privacy Analysis of Communication Protocols for Identity Management},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {235--249},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/YadavLR11,
  author       = {Ravi Shankar Yadav and
                  Praveen Likhar and
                  M. Keshava Rao},
  title        = {SecWEM: {A} Security Solution for Web Based E-mail},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {309--321},
  publisher    = {Springer},
  year         = {2011}
}
@proceedings{DBLP:conf/iciss/2011,
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Information Systems Security - 7th International Conference, {ICISS}
                  2011, Kolkata, India, December 15-19, 2011, Procedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/iciss/AckerNPYP10,
  author       = {Steven {Van Acker} and
                  Nick Nikiforakis and
                  Pieter Philippaerts and
                  Yves Younan and
                  Frank Piessens},
  title        = {ValueGuard: Protection of Native Applications against Data-Only Buffer
                  Overflows},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/BeckerMB10,
  author       = {Moritz Y. Becker and
                  Alexander Malkis and
                  Laurent Bussard},
  title        = {A Practical Generic Privacy Language},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {125--139},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/BirgissonRS10,
  author       = {Arnar Birgisson and
                  Alejandro Russo and
                  Andrei Sabelfeld},
  title        = {Unifying Facets of Information Integrity},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {48--65},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/CaiSLDL10,
  author       = {Shaoying Cai and
                  Chunhua Su and
                  Yingjiu Li and
                  Robert H. Deng and
                  Tieyan Li},
  title        = {Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply
                  Chains},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {246--260},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/ChenXHMX10,
  author       = {Ping Chen and
                  Xiao Xing and
                  Hao Han and
                  Bing Mao and
                  Li Xie},
  title        = {Efficient Detection of the Return-Oriented Programming Malicious Code},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {140--155},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/DaoS10,
  author       = {Thanh{-}Binh Dao and
                  Etsuya Shibayama},
  title        = {Coverage Criteria for Automatic Security Testing of Web Applications},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {111--124},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/FaghihAJ10,
  author       = {Fathieh Faghih and
                  Morteza Amini and
                  Rasool Jalili},
  title        = {Specification of History Based Constraints for Access Control in Conceptual
                  Level},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/GiffinS10,
  author       = {Jonathon T. Giffin and
                  Abhinav Srivastava},
  title        = {Attribution of Malicious Behavior},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {28--47},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/HalderC10,
  author       = {Raju Halder and
                  Agostino Cortesi},
  title        = {A Persistent Public Watermarking of Relational Databases},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {216--230},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/Jaume10,
  author       = {Mathieu Jaume},
  title        = {Security Rules \emph{versus} Security Properties},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {231--245},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/KumarSG10,
  author       = {Ravi Kumar and
                  Shamik Sural and
                  Arobinda Gupta},
  title        = {Mining {RBAC} Roles under Cardinality Constraint},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {171--185},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/Myers10,
  author       = {Andrew C. Myers},
  title        = {Toward Securely Programming the Internet},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {27},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/NandiPV10,
  author       = {Mridul Nandi and
                  Stefan Popoveniuc and
                  Poorvi L. Vora},
  title        = {Stamp-It: {A} Method for Enhancing the Universal Verifiability of
                  {E2E} Voting Systems},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {81--95},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/Rajamani10,
  author       = {Sriram K. Rajamani},
  title        = {Analyzing Explicit Information Flow},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/SrinivasanDGB10,
  author       = {Raghunathan Srinivasan and
                  Partha Dasgupta and
                  Tushar Gohad and
                  Amiya Bhattacharya},
  title        = {Determining the Integrity of Application Binaries on Unsecure Legacy
                  Machines Using Software Based Remote Attestation},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {66--80},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/VenkatakrishnanBLZGG10,
  author       = {V. N. Venkatakrishnan and
                  Prithvi Bisht and
                  Mike Ter Louw and
                  Michelle Zhou and
                  Kalpana Gondi and
                  Karthik Thotta Ganesh},
  title        = {WebAppArmor: {A} Framework for Robust Prevention of Attacks on Web
                  Applications (Invited Paper)},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {3--26},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/WangZP10,
  author       = {Wei Wang and
                  Xiangliang Zhang and
                  Georgios Pitsilis},
  title        = {Abstracting Audit Data for Lightweight Intrusion Detection},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {201--215},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/ZhouBV10,
  author       = {Michelle Zhou and
                  Prithvi Bisht and
                  V. N. Venkatakrishnan},
  title        = {Strengthening {XSRF} Defenses for Legacy Web Applications Using Whitebox
                  Analysis and Transformation},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {96--110},
  publisher    = {Springer},
  year         = {2010}
}
@proceedings{DBLP:conf/iciss/2010,
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iciss/AdjedjBCK09,
  author       = {Michael Adjedj and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Bruno Kindarji},
  title        = {Biometric Identification over Encrypted Data Made Feasible},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {86--100},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/BeraGD09,
  author       = {Padmalochan Bera and
                  Soumya Kanti Ghosh and
                  Pallab Dasgupta},
  title        = {Formal Verification of Security Policy Implementations in Enterprise
                  Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {117--131},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/BhattacharyaC09,
  author       = {Sukriti Bhattacharya and
                  Agostino Cortesi},
  title        = {A Generic Distortion Free Watermarking Technique for Relational Databases},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {252--264},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/ChenXSYMX09,
  author       = {Ping Chen and
                  Hai Xiao and
                  Xiaobin Shen and
                  Xinchun Yin and
                  Bing Mao and
                  Li Xie},
  title        = {{DROP:} Detecting Return-Oriented Programming Malicious Code},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {163--177},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/DacierPT09,
  author       = {Marc Dacier and
                  Van{-}Hau Pham and
                  Olivier Thonnard},
  title        = {The {WOMBAT} Attack Attribution Method: Some Results},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {19--37},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/Frias-MartinezSK09,
  author       = {Vanessa Fr{\'{\i}}as{-}Mart{\'{\i}}nez and
                  Salvatore J. Stolfo and
                  Angelos D. Keromytis},
  title        = {{BARTER:} Behavior Profile Exchange for Behavior-Based Admission and
                  Access Control in MANETs},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {193--207},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/FuZL09,
  author       = {Ge Fu and
                  Hong Zhu and
                  Yingjiu Li},
  title        = {A Robust Damage Assessment Model for Corrupted Database Systems},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {237--251},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/GampaKS09,
  author       = {Nagaraja Kaushik Gampa and
                  Rohit Ashok Khot and
                  Kannan Srinathan},
  title        = {Let Only the Right One {IN:} Privacy Management Scheme for Social
                  Network},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {310--317},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/Govindaraju09,
  author       = {Venu Govindaraju},
  title        = {Biometrics and Security},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {38},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/GuptaP09,
  author       = {Gaurav Gupta and
                  Josef Pieprzyk},
  title        = {Database Relation Watermarking Resilient against Secondary Watermarking
                  Attacks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {222--236},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/Keromytis09,
  author       = {Angelos D. Keromytis},
  title        = {A Survey of Voice over {IP} Security Research},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/LiangLMLD09,
  author       = {Bing Liang and
                  Yingjiu Li and
                  Changshe Ma and
                  Tieyan Li and
                  Robert H. Deng},
  title        = {On the Untraceability of Anonymous {RFID} Authentication Protocol
                  with Constant Key-Lookup},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {71--85},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/LiangV09,
  author       = {Zhiyao Liang and
                  Rakesh M. Verma},
  title        = {Correcting and Improving the {NP} Proof for Cryptographic Protocol
                  Insecurity},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {101--116},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/Mancillas-LopezCR09,
  author       = {Cuauhtemoc Mancillas{-}L{\'{o}}pez and
                  Debrup Chakraborty and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {On Some Weaknesses in the Disk Encryption Schemes {EME} and {EME2}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {265--279},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/MartignoniPB09,
  author       = {Lorenzo Martignoni and
                  Roberto Paleari and
                  Danilo Bruschi},
  title        = {A Framework for Behavior-Based Malware Analysis in the Cloud},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {178--192},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/MasiPT09,
  author       = {Massimiliano Masi and
                  Rosario Pugliese and
                  Francesco Tiezzi},
  title        = {On Secure Implementation of an {IHE} XUA-Based Protocol for Authenticating
                  Healthcare Professionals},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {55--70},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/MukkamalaKY09,
  author       = {Ravi Mukkamala and
                  Vishnu Kamisetty and
                  Pawankumar Yedugani},
  title        = {Detecting and Resolving Misconfigurations in Role-Based Access Control
                  (Short Paper)},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {318--325},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/Nagaratnam09,
  author       = {Nataraj Nagaratnam},
  title        = {Security for a Smarter Planet},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {18},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/OjhaKJL09,
  author       = {Shrikant Ojha and
                  Naveen Kumar and
                  Kritika Jain and
                  Sangeeta Lal},
  title        = {{TWIS} - {A} Lightweight Block Cipher},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {280--291},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/ReiterSSZ09,
  author       = {Michael K. Reiter and
                  Vyas Sekar and
                  Chad Spensky and
                  Zhenghao Zhang},
  title        = {Making Peer-Assisted Content Distribution Robust to Collusion Using
                  Bandwidth Puzzles},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {132--147},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/SahaM09,
  author       = {Indranil Saha and
                  Debapriyay Mukhopadhyay},
  title        = {Quantitative Analysis of a Probabilistic Non-repudiation Protocol
                  through Model Checking},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {292--300},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/SmartR09,
  author       = {Matt Smart and
                  Eike Ritter},
  title        = {Remote Electronic Voting with Revocable Anonymity},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {39--54},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/WhiteP09,
  author       = {Jonathan White and
                  Brajendra Panda},
  title        = {Automatic Identification of Critical Data Items in a Database to Mitigate
                  the Effects of Malicious Insiders},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {208--221},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/ZarnettLT09,
  author       = {Jeff Zarnett and
                  Patrick Lam and
                  Mahesh V. Tripunitara},
  title        = {Method-Specific Java Access Control via {RMI} Proxy Objects Using
                  Annotations},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {301--309},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/ZhangKKZCKL09,
  author       = {Zhen Zhang and
                  K. H. (Kane) Kim and
                  Myeong{-}Ho Kang and
                  Tianran Zhou and
                  Byung{-}Ho Chung and
                  Shin{-}Hyo Kim and
                  Seok{-}Joon Lee},
  title        = {An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing
                  of Information Products},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {148--162},
  publisher    = {Springer},
  year         = {2009}
}
@proceedings{DBLP:conf/iciss/2009,
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/iciss/Avancha08,
  author       = {Sasikanth Avancha},
  title        = {A Framework for Trustworthy Service-Oriented Computing (Short Paper)},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {124--131},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/BaatarjavDP08,
  author       = {Enkh{-}Amgalan Baatarjav and
                  Ram Dantu and
                  Santi Phithakkitnukoon},
  title        = {Privacy Management for Facebook},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {273--286},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/CuppensCT08,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Julien A. Thomas},
  title        = {A Robust Reputation Scheme for Decentralized Group Management Systems},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {71--85},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/DSouzaHKRS08,
  author       = {Deepak D'Souza and
                  Raveendra Holla and
                  Janardhan Kulkarni and
                  Raghavendra K. Ramesh and
                  Barbara Sprick},
  title        = {On the Decidability of Model-Checking Information Flow Properties},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {26--40},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/DasM08,
  author       = {Manik Lal Das and
                  Ravi Mukkamala},
  title        = {Revisiting Bluetooth Security (Short Paper)},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {132--139},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/DusselGLR08,
  author       = {Patrick D{\"{u}}ssel and
                  Christian Gehl and
                  Pavel Laskov and
                  Konrad Rieck},
  title        = {Incorporation of Application Layer Protocol Syntax into Anomaly Detection},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {188--202},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/FalconeFM08,
  author       = {Yli{\`{e}}s Falcone and
                  Jean{-}Claude Fernandez and
                  Laurent Mounier},
  title        = {Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification
                  of Properties},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {41--55},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/FoschiniTCKV08,
  author       = {Luca Foschini and
                  Ashish V. Thapliyal and
                  Lorenzo Cavallaro and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {A Parallel Architecture for Stateful, High-Speed Intrusion Detection},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {203--220},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/FuchsP08,
  author       = {Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {HyDRo - Hybrid Development of Roles},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {287--302},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/JayaramanPG08,
  author       = {Umarani Jayaraman and
                  Surya Prakash and
                  Phalguni Gupta},
  title        = {Indexing Multimodal Biometric Databases Using Kd-Tree with Feature
                  Level Fusion},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {221--234},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/JinwalaPD08,
  author       = {Devesh C. Jinwala and
                  Dhiren R. Patel and
                  Kankar S. Dasgupta},
  title        = {Optimizing the Block Cipher and Modes of Operations Overhead at the
                  Link Layer Security Framework in the Wireless Sensor Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {258--272},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/KSD08,
  author       = {Vivekananda Bhat K. and
                  Indranil Sengupta and
                  Abhijit Das},
  title        = {Audio Watermarking Based on Quantization in Wavelet Domain},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {235--242},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/KingHHJ08,
  author       = {Dave King and
                  Boniface Hicks and
                  Michael Hicks and
                  Trent Jaeger},
  title        = {Implicit Flows: Can't Live with 'Em, Can't Live without 'Em},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {56--70},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/LeBG08,
  author       = {Duc{-}Phong Le and
                  Alexis Bonnecaze and
                  Alban Gabillon},
  title        = {A Secure Round-Based Timestamping Scheme with Absolute Timestamps
                  (Short Paper)},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {116--123},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/LiangV08,
  author       = {Zhiyao Liang and
                  Rakesh M. Verma},
  title        = {Complexity of Checking Freshness of Cryptographic Protocols},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {86--101},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/MondalS08,
  author       = {Samrat Mondal and
                  Shamik Sural},
  title        = {A Verification Framework for Temporal {RBAC} with Role Hierarchy (Short
                  Paper)},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {140--147},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/Nitschke08,
  author       = {Lukasz Nitschke},
  title        = {Secure Internet Voting Based on Paper Ballots},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {102--115},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/Rajan08,
  author       = {Basant Rajan},
  title        = {The Enlightened Era of Enterprise Security (Invited Talk)},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {303--305},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/Sahai08,
  author       = {Amit Sahai},
  title        = {Computing on Encrypted Data},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {148--153},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/SmithEJS08,
  author       = {Randy Smith and
                  Cristian Estan and
                  Somesh Jha and
                  Ida Sri Rejeki Siahaan},
  title        = {Fast Signature Matching Using Extended Finite Automaton {(XFA)}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {158--172},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/SongBYCJKLNPS08,
  author       = {Dawn Xiaodong Song and
                  David Brumley and
                  Heng Yin and
                  Juan Caballero and
                  Ivan Jager and
                  Min Gyung Kang and
                  Zhenkai Liang and
                  James Newsome and
                  Pongsin Poosankam and
                  Prateek Saxena},
  title        = {BitBlaze: {A} New Approach to Computer Security via Binary Analysis},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/SunithaA08,
  author       = {N. R. Sunitha and
                  B. B. Amberker},
  title        = {Proxy Re-signature Schemes},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {156--157},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/TedescoA08,
  author       = {Gianni Tedesco and
                  Uwe Aickelin},
  title        = {Real-Time Alert Correlation with Type Graphs},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {173--187},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/VermaMP08,
  author       = {Neelam Verma and
                  Prasanna R. Mishra and
                  Gireesh Pandey},
  title        = {Identification of Cryptographically Strong and Weak Pseudorandom Bit
                  Generators},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {154--155},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/WrightKS08,
  author       = {Craig S. Wright and
                  Dave Kleiman and
                  Shyaam Sundhar R. S.},
  title        = {Overwriting Hard Drive Data: The Great Wiping Controversy},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {243--257},
  publisher    = {Springer},
  year         = {2008}
}
@proceedings{DBLP:conf/iciss/2008,
  editor       = {R. Sekar and
                  Arun K. Pujari},
  title        = {Information Systems Security, 4th International Conference, {ICISS}
                  2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/iciss/BapatBM07,
  author       = {Dhananjay Bapat and
                  Kevin R. B. Butler and
                  Patrick D. McDaniel},
  title        = {Towards Automated Privilege Separation},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {272--276},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/BhattacharyaBBC07,
  author       = {Debojyoti Bhattacharya and
                  Nitin Bansal and
                  Amitava Banerjee and
                  Dipanwita Roy Chowdhury},
  title        = {A Near Optimal S-Box Design},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {77--90},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/BiskupBWW07,
  author       = {Joachim Biskup and
                  Dominique Marc Burgard and
                  Torben Weibert and
                  Lena Wiese},
  title        = {Inference Control in Logic Databases as a Constraint Satisfaction
                  Problem},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {128--142},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/BobbaK07,
  author       = {Rakeshbabu Bobba and
                  Himanshu Khurana},
  title        = {{DLPKH} - Distributed Logical Public-Key Hierarchy},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {110--127},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/Clavier07,
  author       = {Christophe Clavier},
  title        = {An Improved {SCARE} Cryptanalysis Against a Secret {A3/A8} {GSM} Algorithm},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {143--155},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/DashRP07,
  author       = {Subrat Kumar Dash and
                  Sanjay Rawat and
                  Arun K. Pujari},
  title        = {Use of Dimensionality Reduction for Intrusion Detection},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {306--320},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/GiriS07,
  author       = {Debasis Giri and
                  Parmeshwary Dayal Srivastava},
  title        = {Cryptanalysis and the Improvement of Kim et al.'s Password Authentication
                  Schemes},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {156--166},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/GuptaSMSC07,
  author       = {Gaurav Gupta and
                  R. Sultania and
                  Sounak Mondal and
                  Sanjoy Kumar Saha and
                  Bhabatosh Chanda},
  title        = {A Structured Approach to Detect Scanner-Printer Used in Generating
                  Fake Document},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {250--253},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/KandikattuJ07,
  author       = {Ramanarayana Kandikattu and
                  Lillykutty Jacob},
  title        = {A Secure Intra-domain Routing Protocol for Wireless Mesh Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {37--50},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/KaurSMS07,
  author       = {Navdeep Kaur and
                  Rajwinder Singh and
                  Manoj Misra and
                  Anil Kumar Sarje},
  title        = {Secure Transaction Management Protocols for {MLS/DDBMS}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {219--233},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/LiDKQW07,
  author       = {Jun Li and
                  Dejing Dou and
                  Shiwoong Kim and
                  Han Qin and
                  Yibo Wang},
  title        = {On Knowledge-Based Classification of Abnormal {BGP} Events},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {267--271},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/LimLM07,
  author       = {Meng{-}Hui Lim and
                  Sanggon Lee and
                  Sang{-}Jae Moon},
  title        = {Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key
                  Agreement Protocol},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {64--76},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/ModiEK07,
  author       = {Shimon K. Modi and
                  Stephen J. Elliott and
                  Hakil Kim},
  title        = {Performance Analysis for Multi Sensor Fingerprint Recognition System},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {292--305},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/PatraKT07,
  author       = {G. K. Patra and
                  V. Anil Kumar and
                  R. P. Thangavelu},
  title        = {Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned
                  Signals},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {193--207},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/PatraKT07a,
  author       = {G. K. Patra and
                  V. Anil Kumar and
                  R. P. Thangavelu},
  title        = {A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter
                  Estimation},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {263--266},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/Prakash07,
  author       = {Atul Prakash},
  title        = {Security in Practice - Security-Usability Chasm},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/RajaKNLPVP07,
  author       = {K. B. Raja and
                  Kiran Kumar K. and
                  Satish Kumar N. and
                  M. S. Lakshmi and
                  H. Preeti and
                  K. R. Venugopal and
                  Lalit M. Patnaik},
  title        = {Genetic Algorithm Based Steganography Using Wavelets},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {51--63},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/RamamohanaraoGPL07,
  author       = {Kotagiri Ramamohanarao and
                  Kapil Kumar Gupta and
                  Tao Peng and
                  Christopher Leckie},
  title        = {The Curse of Ease of Access to the Internet},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {234--249},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/RayWMBHL07,
  author       = {Daniel A. Ray and
                  Charles B. Ward and
                  Bogdan Munteanu and
                  Jonathan Blackwell and
                  Xiaoyan Hong and
                  Jun Li},
  title        = {Investigating the Impact of Real-World Factors on Internet Worm Propagation},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {10--24},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/SardanaJ07,
  author       = {Anjali Sardana and
                  Ramesh Chandra Joshi},
  title        = {Simulation of Dynamic Honeypot Based Redirection to Counter Service
                  Level DDoS Attacks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {259--262},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/SaxenaLJLS07,
  author       = {Anshuman Saxena and
                  Marc Lacoste and
                  Tahar Jarboui and
                  Ulf L{\"{u}}cking and
                  Bernd Steinke},
  title        = {A Software Framework for Autonomic Security in Pervasive Environments},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {91--109},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/ShanWM07,
  author       = {Zhiyong Shan and
                  Qiuyue Wang and
                  Xiaofeng Meng},
  title        = {An {OS} Security Protection Model for Defeating Attacks from Network},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {25--36},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/SharifiSVZ07,
  author       = {Mohsen Sharifi and
                  Alireza Saberi and
                  Mojtaba Vahidi and
                  Mohammad Zoroufi},
  title        = {A Zero Knowledge Password Proof Mutual Authentication Technique Against
                  Real-Time Phishing Attacks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {254--258},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/SinghC07,
  author       = {Ashish Kumar Singh and
                  Priya Chandran},
  title        = {A Secure and Efficient Multi-authority Proactive Election Scheme},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {208--218},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/SivakumarG07,
  author       = {K. Sivakumar and
                  K. Garg},
  title        = {Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration
                  (CXE)" Using {CWE} and {CVE}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {277--291},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/Tanaka07,
  author       = {Hidema Tanaka},
  title        = {Information Leakage Via Electromagnetic Emanations and Evaluation
                  of Tempest Countermeasures},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {167--179},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/VimercatiS07,
  author       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Data Privacy - Problems and Solutions},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {180--192},
  publisher    = {Springer},
  year         = {2007}
}
@proceedings{DBLP:conf/iciss/2007,
  editor       = {Patrick D. McDaniel and
                  Shyam K. Gupta},
  title        = {Information Systems Security, Third International Conference, {ICISS}
                  2007, Delhi, India, December 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/iciss/BiskupP06,
  author       = {Joachim Biskup and
                  Joerg Parthe},
  title        = {Optimistic Anonymous Participation in Inter-organizational Workflow
                  Instances},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {86--100},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/ButlerEPTM06,
  author       = {Kevin R. B. Butler and
                  William Enck and
                  Jennifer Plasterr and
                  Patrick Traynor and
                  Patrick D. McDaniel},
  title        = {Privacy Preserving Web-Based Email},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {116--131},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/ChaithanyaSG06,
  author       = {L. Chaithanya and
                  M. P. Singh and
                  M. M. Gore},
  title        = {Secure Data Management in Reactive Sensor Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {235--248},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/ClairJEPTMJ06,
  author       = {Luke St. Clair and
                  Lisa Johansen and
                  William Enck and
                  Matthew Pirretti and
                  Patrick Traynor and
                  Patrick D. McDaniel and
                  Trent Jaeger},
  title        = {Password Exhaustion: Predicting the End of Password Usefulness},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {37--55},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/CuppensCC06,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  C{\'{e}}line Coma},
  title        = {{O2O:} Virtual Private Organizations to Manage Security Policy Interoperability},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {101--115},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/DamianiVFS06,
  author       = {Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Cristiano Fugazza and
                  Pierangela Samarati},
  title        = {Extending Context Descriptions in Semantics-Aware Access Control},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {162--176},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/EkelhartFKW06,
  author       = {Andreas Ekelhart and
                  Stefan Fenz and
                  Markus D. Klemen and
                  Edgar R. Weippl},
  title        = {Security Ontology: Simulating Threats to Corporate Assets},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {249--259},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/Ghodosi06,
  author       = {Hossein Ghodosi},
  title        = {An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext
                  Attack},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {303--314},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/GuptaGG06,
  author       = {Shyam K. Gupta and
                  Vikram Goyal and
                  Anand Gupta},
  title        = {Malafide Intension Based Detection of Privacy Violation in Information
                  System},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {365--368},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/GuptaGPDG06,
  author       = {Shyam K. Gupta and
                  Vikram Goyal and
                  Bholi Patra and
                  Sankalp Dubey and
                  Anand Gupta},
  title        = {Design and Development of Malafide Intension Based Privacy Violation
                  Detection System (An Ongoing Research Report)},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {369--372},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/GurevichG06,
  author       = {Alex Gurevich and
                  Ehud Gudes},
  title        = {Recent Research on Privacy Preserving Data Mining},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {377--380},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/KaurSMS06,
  author       = {Navdeep Kaur and
                  Rajwinder Singh and
                  Manoj Misra and
                  Anil Kumar Sarje},
  title        = {Fairness Strategy for Multilevel Secure Concurrency Control Protocol},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {71--85},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/KumarS06,
  author       = {N. V. Narendra Kumar and
                  R. K. Shyamasundar},
  title        = {Specification and Realization of Access Control in {SPKI/SDSI}},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {177--193},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/KunduSM06,
  author       = {Amlan Kundu and
                  Shamik Sural and
                  Arun K. Majumdar},
  title        = {Two-Stage Credit Card Fraud Detection Using Sequence Alignment},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {260--275},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/LeeR06,
  author       = {Hyeran Lee and
                  Kyung Hyune Rhee},
  title        = {High Capacity Lossless Data Hiding},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {326--336},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/LuLW06,
  author       = {Haibing Lu and
                  Yingjiu Li and
                  Xintao Wu},
  title        = {Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended
                  Abstract)},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {349--352},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/MajumdarTD06,
  author       = {Anirban Majumdar and
                  Clark D. Thomborson and
                  Stephen Drape},
  title        = {A Survey of Control-Flow Obfuscations},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {353--356},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/MasoumzadehAJ06,
  author       = {Amirreza Masoumzadeh and
                  Morteza Amini and
                  Rasool Jalili},
  title        = {Context-Aware Provisional Access Control},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {132--146},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/RaoMP06,
  author       = {Y. V. Subba Rao and
                  Abhijit Mitra and
                  S. R. Mahadeva Prasanna},
  title        = {A Partial Image Encryption Method with Pseudo Random Sequences},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {315--325},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/RayKY06,
  author       = {Indrakshi Ray and
                  Mahendra Kumar and
                  Lijun Yu},
  title        = {{LRBAC:} {A} Location-Aware Role-Based Access Control Model},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {147--161},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/ReddyDP06,
  author       = {Krishna Sandeep Reddy Dubba and
                  Subrat Kumar Dash and
                  Arun K. Pujari},
  title        = {New Malicious Code Detection Using Variable Length \emph{n}-grams},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {276--288},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/SahaR06,
  author       = {Mounita Saha and
                  Dipanwita Roy Chowdhury},
  title        = {Design of Key Establishment Protocol Using One-Way Functions to Avert
                  \emph{insider-replay} Attack},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {194--204},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/SaizMJBA06,
  author       = {Purificaci{\'{o}}n S{\'{a}}iz and
                  Jon Mat{\'{\i}}as and
                  Eduardo Jacob and
                  Javier Bustamante and
                  Armando Astarloa},
  title        = {Adaptation of {IEEE} 802.1X for Secure Session Establishment Between
                  Ethernet Peers},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {220--234},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/SenguptaB06,
  author       = {Anirban Sengupta and
                  Mridul Sankar Barik},
  title        = {Towards a Formal Specification Method for Enterprise Information System
                  Security},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {373--376},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/ShanmugasundaramM06,
  author       = {Kulesh Shanmugasundaram and
                  Nasir D. Memon},
  title        = {Network Monitoring for Security and Forensics},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {56--70},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/SinghKS06,
  author       = {Rajwinder Singh and
                  Navdeep Kaur and
                  Anil Kumar Sarje},
  title        = {Secure Itineraries Framework for Mobile Agent Systems},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {361--364},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/SinghLMVA06,
  author       = {Vartika Singh and
                  D. R. Lakshminarasimhaiah and
                  Yogesh Mishra and
                  Chitra Viswanathan and
                  G. Athithan},
  title        = {An Implementation and Evaluation of Online Disk Encryption for Windows
                  Systems},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {337--348},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/SwarupSR06,
  author       = {Vipin Swarup and
                  Len Seligman and
                  Arnon Rosenthal},
  title        = {A Data Sharing Agreement Framework},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {22--36},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/VadnalaM06,
  author       = {Praveen Kumar Vadnala and
                  Anish Mathuria},
  title        = {An Efficient Key Assignment Scheme for Access Control in a Hierarchy},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {205--219},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/VimercatiS06,
  author       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Privacy in the Electronic Society},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/YuanGLLL06,
  author       = {Weiwei Yuan and
                  Donghai Guan and
                  Sungyoung Lee and
                  Young{-}Koo Lee and
                  Heejo Lee},
  title        = {Filtering Out Unfair Recommendations for Trust Model in Ubiquitous
                  Environments},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {357--360},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/ZangY06,
  author       = {Wanyu Zang and
                  Meng Yu},
  title        = {A Dead-Lock Free Self-healing Algorithm for Distributed Transactional
                  Processes},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {289--302},
  publisher    = {Springer},
  year         = {2006}
}
@proceedings{DBLP:conf/iciss/2006,
  editor       = {Aditya Bagchi and
                  Vijayalakshmi Atluri},
  title        = {Information Systems Security, Second International Conference, {ICISS}
                  2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/iciss/Bagchi-SenLRU05,
  author       = {Sharmistha Bagchi{-}Sen and
                  JinKyu Lee and
                  H. Raghav Rao and
                  Shambhu J. Upadhyaya},
  title        = {A Framework for Examining Skill Specialization, Gender Inequity, and
                  Career Advancement in the Information Security Field},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {317--321},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/BhattacharyaG05,
  author       = {Jaijit Bhattacharya and
                  S. K. Gupta},
  title        = {{EPAL} Based Privacy Enforcement Using {ECA} Rules},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {120--133},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/ButlerM05,
  author       = {Kevin R. B. Butler and
                  Patrick D. McDaniel},
  title        = {Understanding Mutable Internet Pathogens, or How {I} Learned to Stop
                  Worrying and Love Parasitic Behavior},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {36--48},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/ChakrabartiMR05,
  author       = {Dibyendu Chakrabarti and
                  Subhamoy Maitra and
                  Bimal K. Roy},
  title        = {A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor
                  Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {228--238},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/Chand05,
  author       = {Prem Chand},
  title        = {Building India as the Destination for Secure Software Development
                  - Next Wave of Opportunities for the {ICT} Industry},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {49--65},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/ChatterjeeSR05,
  author       = {Roshni Chatterjee and
                  Moiz A. Saifee and
                  Dipanwita Roy Chowdhury},
  title        = {Modifications of {SHA-0} to Prevent Attacks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {277--289},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/ChristiansonCM05,
  author       = {Bruce Christianson and
                  Partha Das Chowdhury and
                  James A. Malcolm},
  title        = {Auditable Anonymous Delegation},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {66--76},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/CuppensCS05,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Thierry Sans},
  title        = {Protection of Relationships in {XML} Documents with the {XML-BB} Model},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {148--163},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/DamianiAB05,
  author       = {Ernesto Damiani and
                  Marco Anisetti and
                  Valerio Bellandi},
  title        = {Toward Exploiting Location-Based and Video Information in Negotiated
                  Access Control Policies},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {21--35},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/Das05,
  author       = {Ashok Kumar Das},
  title        = {A Key Reshuffling Scheme for Wireless Sensor Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {205--216},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/DashRP05,
  author       = {Subrat Kumar Dash and
                  Krupa Sagar Reddy and
                  Arun K. Pujari},
  title        = {Episode Based Masquerade Detection},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {251--262},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/HaZM05,
  author       = {JungHoon Ha and
                  Jianying Zhou and
                  Sang{-}Jae Moon},
  title        = {A Robust Double Auction Protocol Based on a Hybrid Trust Model},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {77--90},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/MisraPB05,
  author       = {Jaydev Mishra and
                  Pinakpani Pal and
                  Aditya Bagchi},
  title        = {{SPEAR:} Design of a Secured Peer-to-Peer Architecture},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {322--327},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/MukhopadhyayCNC05,
  author       = {Debdeep Mukhopadhyay and
                  Abhishek Chaudhary and
                  Arvind Nebhnani and
                  Dipanwita Roy Chowdhury},
  title        = {{CCMEA:} Customized Cellular Message Encryption Algorithm for Wireless
                  Networks},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {217--227},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/OhLM05,
  author       = {JoongHyo Oh and
                  KyungKeun Lee and
                  Sang{-}Jae Moon},
  title        = {How to Solve Key Escrow and Identity Revocation in Identity-Based
                  Encryption Schemes},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {290--303},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/RadhaK05,
  author       = {V. Radha and
                  N. Hemanth Kumar},
  title        = {{EISA} - An Enterprise Application Security Solution for Databases},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {164--176},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/RamachandranN05,
  author       = {Vivek Ramachandran and
                  Sukumar Nandi},
  title        = {Detecting {ARP} Spoofing: An Active Technique},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {239--250},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/Ramkumar05,
  author       = {Mahalingam Ramkumar},
  title        = {On Broadcast Encryption with Random Key Pre-distribution Schemes},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {304--316},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/RayCR05,
  author       = {Indrajit Ray and
                  Sudip Chakraborty and
                  Indrakshi Ray},
  title        = {VTrust: {A} Trust Management System Based on a Vector Model of Trust},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {91--105},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/RayH05,
  author       = {Indrakshi Ray and
                  Wei Huang},
  title        = {Event Detection in Multilevel Secure Active Databases},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {177--190},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/SenguptaMRRABM05,
  author       = {Anirban Sengupta and
                  Aniruddha Mukhopadhyay and
                  Koel Ray and
                  Aveek Guha Roy and
                  Dipankar Aich and
                  Mridul Sankar Barik and
                  Chandan Mazumdar},
  title        = {A Web-Enabled Enterprise Security Management Framework Based on a
                  Unified Model of Enterprise Information System Security},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {328--331},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/SubramanianPBKGSVARP05,
  author       = {N. Subramanian and
                  Pramod S. Pawar and
                  Mayank Bhatnagar and
                  Nihar S. Khedekar and
                  Srinivas Guntupalli and
                  N. Satyanarayana and
                  V. K. Vijaykumar and
                  Praveen D. Ampatt and
                  Rajiv Ranjan and
                  Prasad J. Pandit},
  title        = {Development of a Comprehensive Intrusion Detection System - Challenges
                  and Approaches},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {332--335},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/ThomasMEB05,
  author       = {Shince Thomas and
                  Devesh Misra and
                  P. R. Lakshmi Eswari and
                  N. Sarat Chandra Babu},
  title        = {A Transparent End-to-End Security Solution},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {336--339},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/Varadharajan05,
  author       = {Vijay Varadharajan},
  title        = {Authorization and Trust Enhanced Security for Distributed Applications},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/VatsaSM05,
  author       = {Vishal Vatsa and
                  Shamik Sural and
                  Arun K. Majumdar},
  title        = {A Game-Theoretic Approach to Credit Card Fraud Detection},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {263--276},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/WangHI05,
  author       = {Jian Wang and
                  Lein Harn and
                  Hideki Imai},
  title        = {Key Management for Multicast Fingerprinting},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {191--204},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/WarnerAM05,
  author       = {Janice Warner and
                  Vijayalakshmi Atluri and
                  Ravi Mukkamala},
  title        = {An Attribute Graph Based Approach to Map Local Access Control Policies
                  to Credential Based Access Control Policies},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {134--147},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/iciss/ZhaoVB05,
  author       = {Weiliang Zhao and
                  Vijay Varadharajan and
                  George Bryan},
  title        = {Analysis and Modelling of Trust in Distributed Information Systems},
  booktitle    = {{ICISS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {106--119},
  publisher    = {Springer},
  year         = {2005}
}
@proceedings{DBLP:conf/iciss/2005,
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Information Systems Security, First International Conference, {ICISS}
                  2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  publisher    = {Springer},
  year         = {2005}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics