Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/iciss:"
@inproceedings{DBLP:conf/iciss/AkbarRSKT23, author = {Khandakar Ashrafi Akbar and Fariha Ishrat Rahman and Anoop Singhal and Latifur Khan and Bhavani Thuraisingham}, title = {The Design and Application of a Unified Ontology for Cyber Security}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {23--41}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/ArakkalSV23, author = {Ajith Arakkal and Shehzad Pazheri Sharafudheen and A. R. Vasudevan}, title = {Crypto-Ransomware Detection: {A} Honey-File Based Approach Using Chi-Square Test}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {449--458}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/BalijabuddaACC23, author = {Venkata Sreekanth Balijabudda and Kamalesh Acharya and Rajat Subhra Chakraborty and Indrajit Chakrabarti}, title = {Theoretical Enumeration of Deployable Single-Output Strong {PUF} Instances Based on Uniformity and Uniqueness Constraints}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {77--87}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/BhaskarPJ23, author = {Sourabh Bhaskar and Keyur Parmar and Devesh C. Jinwala}, title = {Escrow and Pairing Free {CP-ABE} Scheme with Forward and Backward Secrecy for Healthcare Internet of Things}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {306--316}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/ChackoRAP23, author = {Lenoah Chacko and Pavithra Rajan and Varun Anilkumar and Vinod Pathari}, title = {Proof-of-Variable-Authority: {A} Blockchain Consensus Mechanism for Securing IoT Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {396--410}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/Chandran23, author = {Nishanth Chandran}, title = {Security and Privacy in Machine Learning}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {229--248}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/DasMDBN23, author = {Arnab Kumar Das and Soumik Mukhopadhyay and Arijit Dalui and Ritaban Bhattacharya and Ruchira Naskar}, title = {A Multi-stage Multi-modal Classification Model for DeepFakes Combining Deep Learned and Computer Vision Oriented Features}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {217--226}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/DwivediBAS23, author = {Surabhi Dwivedi and R. Balaji and Praveen Ampatt and Sithu D. Sudarsan}, title = {A Survey on Security Threats and Mitigation Strategies for NoSQL Databases - MongoDB as a Use Case}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {57--76}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/GainB23, author = {Ayan Gain and Mridul Sankar Barik}, title = {Attack Graph Based Security Metrics for Dynamic Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {109--128}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/GhoshN23, author = {Tanusree Ghosh and Ruchira Naskar}, title = {STN-Net: {A} Robust GAN-Generated Face Detector}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {141--158}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/JainP23, author = {Anubha Jain and Emmanuel S. Pilli}, title = {SoK: Digital Signatures and Taproot Transactions in Bitcoin}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {360--379}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/KammulaAS23, author = {Sunil Kumar Kammula and Veena Anand and Deepak Singh}, title = {An Energy-Conscious Surveillance Scheme for Intrusion Detection in Underwater Sensor Networks Using Tunicate Swarm Optimization}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {129--138}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/Kar23, author = {Jayaprakash Kar}, title = {{PSDP:} Blockchain-Based Computationally Efficient Provably Secure Data Possession}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {459--468}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/Mager23, author = {Thomas Mager}, title = {Big Data Forensics on Apache Kafka}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {42--56}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/MishraI23, author = {Nimish Mishra and SK Hafizul Islam}, title = {{BCTPV-NIZK:} Publicly-Verifiable Non-interactive Zero-Knowledge Proof System from Minimal Blockchain Assumptions}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {380--395}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/MukherjeeTRPS23, author = {Preetam Mukherjee and Sabu M. Thampi and N. Rohith and Bishwajit Kumar Poddar and Ipshita Sen}, title = {Detection and Hardening Strategies to Secure an Enterprise Network}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {91--108}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/NarumanchiME23, author = {Harika Narumanchi and Lakshmi Padmaja Maddali and Nitesh Emmadi}, title = {Private and Verifiable Inter-bank Transactions and Settlements on Blockchain}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {469--479}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/OzdenY23, author = {Duygu Ozden and Oguz Yayla}, title = {Verifiable Timed Accountable Subgroup Multi-signatures}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {295--305}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/ParbatBC23, author = {Tanusree Parbat and Aniket Banerjee and Ayantika Chatterjee}, title = {Democracy in Your Hands!: Practical Multi-key Homomorphic E-Voting}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {259--271}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/PriyadarshiGK23, author = {Vishisht Priyadarshi and Sourav Goel and Kalpesh Kapoor}, title = {Analysis of Optimal Number of Shards Using ShardEval, {A} Simulator for Sharded Blockchains}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {339--359}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/RodriguezK23, author = {David Rodriguez and Ram Krishnan}, title = {A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {178--196}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/SantosLW23, author = {Cristian Alves dos Santos and Leandro Loffi and Carla Merkle Westphall}, title = {Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self-Sovereign Identities}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {319--338}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/SanyashiBS23, author = {Tikaram Sanyashi and Nirmal Kumar Boran and Virendra Singh}, title = {Secure {KNN} Computation on Cloud}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {197--216}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/SethiAB23, author = {Kamalakanta Sethi and Aniket Agrawal and Padmalochan Bera}, title = {Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {431--448}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/SharmaM23, author = {Abhyudaya Sharma and Sweta Mishra}, title = {A Security Analysis of Password Managers on Android}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {3--22}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/SinghT23, author = {Narendra Singh and Somanath Tripathy}, title = {MDLDroid: Multimodal Deep Learning Based Android Malware Detection}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {159--177}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/SyedPSR23, author = {Habeeb Syed and Arinjita Paul and Meena Singh Dilip Singh and M. A. Rajan}, title = {An Efficient Two-Party {ECDSA} Scheme for Cryptocurrencies}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {411--430}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/ThusharaB23, author = {G. A. Thushara and S. Mary Saira Bhanu}, title = {Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {275--294}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/VargheeseV23, author = {Meghana Vargheese and Srinivas Vivek}, title = {Attack on the Privacy-Preserving Carpooling Service {TAROT}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {249--258}, publisher = {Springer}, year = {2023} }
@proceedings{DBLP:conf/iciss/2023, editor = {Vallipuram Muthukkumarasamy and Sithu D. Sudarsan and Rudrapatna K. Shyamasundar}, title = {Information Systems Security - 19th International Conference, {ICISS} 2023, Raipur, India, December 16-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14424}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/iciss/AmmaV22, author = {N. G. Bhuvaneswari Amma and P. Valarmathi}, title = {IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {155--168}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iciss/BansalGB22, author = {Vidhi Bansal and Mohona Ghosh and Niyati Baliyan}, title = {Efficient and Effective Static Android Malware Detection Using Machine Learning}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {103--118}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iciss/DavariZ22, author = {Maryam Davari and Mohammad Zulkernine}, title = {Mining Attribute-Based Access Control Policies}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {186--201}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iciss/FaisalZ22, author = {Abu Faisal and Mohammad Zulkernine}, title = {{DKS-PKI:} {A} Distributed Key Server Architecture for Public Key Infrastructure}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {23--43}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iciss/GhosalS22, author = {Sandip Ghosal and R. K. Shyamasundar}, title = {Preventing Privacy-Violating Information Flows in JavaScript Applications Using Dynamic Labelling}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {202--219}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iciss/GhoshSGV22, author = {Sutanu Kumar Ghosh and Kiavash Satvat and Rigel Gjomemo and V. N. Venkatakrishnan}, title = {Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {1--22}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iciss/HubballiP22, author = {Neminath Hubballi and Kanishk Patel}, title = {WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {235--246}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iciss/MadabhushiD22, author = {Srinidhi Madabhushi and Rinku Dewri}, title = {On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {220--234}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iciss/MannaKT22, author = {Debasmita Manna and Harsh Kasyap and Somanath Tripathy}, title = {{MILSA:} Model Interpretation Based Label Sniffing Attack in Federated Learning}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {139--154}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iciss/MortlD22, author = {Karin Mortl and Rinku Dewri}, title = {Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private Record Linkage}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {44--63}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iciss/RadhikaKS22, author = {B. S. Radhika and N. V. Narendra Kumar and R. K. Shyamasundar}, title = {Samyukta: {A} Unified Access Control Model using Roles, Labels, and Attributes}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {84--102}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iciss/SangwanJH22, author = {Aniket Sangwan and Sarthak Jain and Neminath Hubballi}, title = {WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {247--259}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iciss/SinghS22, author = {Gulshan Kumar Singh and Gaurav Somani}, title = {Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud Attack Detection {(OCAD)}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {169--185}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iciss/SinghTB22, author = {Narendra Singh and Somanath Tripathy and Bruhadeshwar Bezawada}, title = {{SHIELD:} {A} Multimodal Deep Learning Framework for Android Malware Detection}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {64--83}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iciss/SoodPH22, author = {Shaurya Sood and Pritesh Palod and Neminath Hubballi}, title = {WiP: Characterizing the Impact of Multiplexed DoS Attacks on {HTTP} and Detection}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {260--271}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iciss/ZouZSSL22, author = {Qingtian Zou and Lan Zhang and Anoop Singhal and Xiaoyan Sun and Peng Liu}, title = {Attacks on {ML} Systems: From Security Analysis to Attack Mitigation}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {119--138}, publisher = {Springer}, year = {2022} }
@proceedings{DBLP:conf/iciss/2022, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iciss/AkbarWISKT21, author = {Khandakar Ashrafi Akbar and Yigong Wang and Md Shihabul Islam and Anoop Singhal and Latifur Khan and Bhavani Thuraisingham}, title = {Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13146}, pages = {3--25}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/iciss/AmighiBO21, author = {Afshin Amighi and Mortaza S. Bargh and Ahmad Omar}, title = {WiP: {A} Distributed Approach for Statistical Disclosure Control Technologies}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13146}, pages = {142--153}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/iciss/AryaC21, author = {Shivani Arya and Saurabh Chamotra}, title = {Multi Layer Detection Framework for Spear-Phishing Attacks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13146}, pages = {38--56}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/iciss/Bhat21, author = {Krishnaraj Bhat}, title = {A Verifiable Lossless Multiple Secret Images Sharing Scheme}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13146}, pages = {157--172}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/iciss/GS21, author = {Renjith G and Aji S}, title = {Vulnerability Analysis and Detection Using Graph Neural Networks for Android Operating System}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13146}, pages = {57--72}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/iciss/KumarS21, author = {Tejpal Kumar and Gaurav Somani}, title = {Origin Information Assisted Hybrid Analysis to Detect {APT} Malware}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13146}, pages = {75--93}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/iciss/Mukhopadhyay21, author = {Debapriyay Mukhopadhyay}, title = {Improvement over Montgomery Modular Multiplication}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13146}, pages = {212--217}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/iciss/PatilS21, author = {Vishwas Patil and R. K. Shyamasundar}, title = {Landcoin: {A} Practical Protocol for Transfer-of-Asset}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13146}, pages = {124--141}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/iciss/RomanaBKPE21, author = {Sandeep Romana and Anil D. Bandgar and Mohit Kumar and Mahesh Uttam Patil and P. R. Lakshmi Eswari}, title = {Raising {MIPS} Binaries to {LLVM} {IR}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13146}, pages = {94--108}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/iciss/SaravaniRR21, author = {Sina Mahdipour Saravani and Indrajit Ray and Indrakshi Ray}, title = {Automated Identification of Social Media Bots Using Deepfake Text Detection}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13146}, pages = {111--123}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/iciss/ShaikCRGBL21, author = {Imtiyazuddin Shaik and Raj Chaudhari and M. A. Rajan and Jay Gubbi and P. Balamuralidhar and Sachin Lodha}, title = {WiP: QoS Based Recommendation System for Efficient Private Inference of {CNN} Using {FHE}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13146}, pages = {198--211}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/iciss/SoodSH21, author = {Shaurya Sood and Manash Saikia and Neminath Hubballi}, title = {WiP: Slow Rate {HTTP} Attack Detection with Behavioral Parameters}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13146}, pages = {26--37}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/iciss/SyedSENTB21, author = {Habeeb Syed and Imtiyazuddin Shaik and Nitesh Emmadi and Harika Narumanchi and Meena Singh Dilip Thakur and Rajan Mindigal Alasingara Bhattachar}, title = {WiP: Privacy Enabled Biometric Authentication Based on Proof of Decryption Techniques}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13146}, pages = {185--197}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/iciss/TakeshigeKT21, author = {Amane Takeshige and Haruhisa Kosuge and Hidema Tanaka}, title = {Experimental Verification of Estimated Block Size of {BKZ} Algorithm Against {LWE}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13146}, pages = {173--184}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/iciss/VermaMD21, author = {Pranav Verma and Anish Mathuria and Sourish Dasgupta}, title = {Faster Private Rating Update via Integer-Based Homomorphic Encryption}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {13146}, pages = {218--236}, publisher = {Springer}, year = {2021} }
@proceedings{DBLP:conf/iciss/2021, editor = {Somanath Tripathy and Rudrapatna K. Shyamasundar and Rajiv Ranjan}, title = {Information Systems Security - 17th International Conference, {ICISS} 2021, Patna, India, December 16-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13146}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/iciss/BuiS20, author = {Thang Bui and Scott D. Stoller}, title = {Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {23--44}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/iciss/ChouguleTL20, author = {Abhijeet Chougule and Harshal Tupsamudre and Sachin Lodha}, title = {Revelio: {A} Lightweight Captcha Solver Using a Dictionary Based Approach}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {97--116}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/iciss/DuttaK20, author = {Abir Dutta and Shri Kant}, title = {An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {81--86}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/iciss/DuttaSARS20, author = {Sabyasachi Dutta and Md Kutubuddin Sardar and Avishek Adhikari and Sushmita Ruj and Kouichi Sakurai}, title = {Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {198--217}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/iciss/GaoN20, author = {Yansong Gao and Surya Nepal}, title = {A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {69--80}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/iciss/GargB20, author = {Shivi Garg and Niyati Baliyan}, title = {Machine Learning Based Android Vulnerability Detection: {A} Roadmap}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {87--93}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/iciss/KumarKP20, author = {Sudesh Kumar and Lakshmi Jayant Kittur and Alwyn Roshan Pais}, title = {Attacks on Android-Based Smartphones and Impact of Vendor Customization on Android {OS} Security}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {241--252}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/iciss/LeszczynaL20, author = {Rafal Leszczyna and Adrian Litwin}, title = {Estimating the Cost of Cybersecurity Activities with CAsPeA: {A} Case Study and Comparative Analysis}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {267--287}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/iciss/MishraS20, author = {Saurabh Mishra and Debanjan Sadhya}, title = {LiARX: {A} Lightweight Cipher Based on the {LTS} Design Strategy of {ARX}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {185--197}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/iciss/MondalPKN20, author = {Sobhan Mondal and Deependra Pushkar and Mrinali Kumari and Ruchira Naskar}, title = {Forensic Source Identification of {OSN} Compressed Images}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {160--166}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/iciss/PiroccaAZ20, author = {Simone Pirocca and Luca Allodi and Nicola Zannone}, title = {A Toolkit for Security Awareness Training Against Targeted Phishing}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {137--159}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/iciss/PramanikD0A20, author = {Jyotirmoy Pramanik and Sabyasachi Dutta and Partha Sarathi Roy and Avishek Adhikari}, title = {Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {169--184}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/iciss/ShahN20, author = {Ryan Shah and Shishir Nagaraja}, title = {A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {3--22}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/iciss/TanakaF20, author = {Hidema Tanaka and Keisuke Fukushima}, title = {Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {221--240}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/iciss/Theuermann20, author = {Kevin Theuermann}, title = {Reliability and Security for Safety-Critical Service Compositions}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {45--65}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/iciss/UplavikarV0J20, author = {Nitish M. Uplavikar and Jaideep Vaidya and Dan Lin and Wei Jiang}, title = {Privacy-Preserving Friend Recommendation in an Integrated Social Environment}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {117--136}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/iciss/VermaMS20, author = {Vinita Verma and Sunil Kumar Muttoo and V. B. Singh}, title = {Detection of Malign and Benign {PE} Files Using Texture Analysis}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {253--266}, publisher = {Springer}, year = {2020} }
@proceedings{DBLP:conf/iciss/2020, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/iciss/AcharyaPT19, author = {Anasuya Acharya and Manoj Prabhakaran and Akash Trehan}, title = {An Introduction to the CellTree Paradigm (Invited Paper)}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {137--153}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/BatraAVS19, author = {Gunjan Batra and Vijayalakshmi Atluri and Jaideep Vaidya and Shamik Sural}, title = {Policy Reconciliation and Migration in Attribute Based Access Control}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {99--120}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/BopcheRRM19, author = {Ghanshyam S. Bopche and Gopal N. Rai and B. Ramachandra Reddy and Babu M. Mehtre}, title = {Differential Attack Graph-Based Approach for Assessing Change in the Network Attack Surface}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {324--344}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/DalaiP19, author = {Deepak Kumar Dalai and Santu Pal}, title = {Wip: Degree Evaluation of Grain-v1}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {239--251}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/DasSVAR19, author = {Saptarshi Das and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri and Gerhard Rigoll}, title = {VisMAP: Visual Mining of Attribute-Based Access Control Policies}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {79--98}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/DubeyRSM19, author = {Aditya Dubey and Uttara Ravi and Somya Sharma and Barsha Mitra}, title = {Toward Implementing Spatio-Temporal {RBAC} Extensions}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {59--78}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/FatimaI19, author = {Eram Fatima and Saiful Islam}, title = {A New High Capacity and Reversible Data Hiding Technique for Images}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {290--304}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/GangwarR19, author = {Akhilesh Gangwar and Vadlamani Ravi}, title = {WiP: Generative Adversarial Network for Oversampling Data in Credit Card Fraud Detection}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {123--134}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/HaglundG19, author = {Jonas Haglund and Roberto Guanciale}, title = {Trustworthy Isolation of {DMA} Enabled Devices}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {35--55}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/HorandnerN19, author = {Felix H{\"{o}}randner and Franco Nieddu}, title = {Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound Keys}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {196--217}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/HorandnerRR19, author = {Felix H{\"{o}}randner and Sebastian Ramacher and Simon Roth}, title = {Selective End-To-End Data-Sharing in the Cloud}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {175--195}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/JishaM19, author = {T. E. Jisha and Thomas Monoth}, title = {WiP: Security Enhanced Size Invariant Visual Cryptography with Perfect Reconstruction of White Pixels}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {279--289}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/KadhiwalaP19, author = {Bintu Kadhiwala and Sankita J. Patel}, title = {A Novel k-Anonymization Approach to Prevent Insider Attack in Collaborative Social Network Data Publishing}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {255--275}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/MandalD19, author = {Arkaprava Bhaduri Mandal and Tanmoy Kanti Das}, title = {Anti-forensics of a {NAD-JPEG} Detection Scheme Using Estimation of {DC} Coefficients}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {307--323}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/NorooziSKI19, author = {Ali A. Noroozi and Khayyam Salehi and Jaber Karimpour and Ayaz Isazadeh}, title = {Secure Information Flow Analysis Using the {PRISM} Model Checker}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {154--172}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/PalLS19, author = {Priyanka Pal and Sudharsana K. J. L. and Rohith Balaji S.}, title = {WiP: Criminal Smart Contract for Private Key Theft in End to End Encrypted Applications}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {21--32}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/PalmaGVM19, author = {Lucas M. Palma and Fernanda Oliveira Gomes and Mart{\'{\i}}n A. Gagliotti Vigil and Jean Everson Martina}, title = {A Transparent and Privacy-Aware Approach Using Smart Contracts for Car Insurance Reward Programs}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {3--20}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/VermaMD19, author = {Pranav Verma and Anish Mathuria and Sourish Dasgupta}, title = {Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirements}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {218--238}, publisher = {Springer}, year = {2019} }
@proceedings{DBLP:conf/iciss/2019, editor = {Deepak Garg and N. V. Narendra Kumar and Rudrapatna K. Shyamasundar}, title = {Information Systems Security - 15th International Conference, {ICISS} 2019, Hyderabad, India, December 16-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11952}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iciss/AdityaGL18, author = {K. Aditya and Slawomir Grzonkowski and Nhien{-}An Le{-}Khac}, title = {RiskWriter: Predicting Cyber Risk of an Enterprise}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {88--106}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/BakasN18, author = {Jamimamul Bakas and Ruchira Naskar}, title = {A Digital Forensic Technique for Inter-Frame Video Forgery Detection Based on 3D {CNN}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {304--317}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/BakasRKN18, author = {Jamimamul Bakas and Praneta Rawat and Kalyan Kokkalla and Ruchira Naskar}, title = {Re-compression Based {JPEG} Tamper Detection and Localization Using Deep Neural Network, Eliminating Compression Factor Dependency}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {318--341}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/BopcheRMG18, author = {Ghanshyam S. Bopche and Gopal N. Rai and Babu M. Mehtre and G. R. Gangadharan}, title = {Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {67--87}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/BoyerCCQD18, author = {Kirk Boyer and Hao Chen and Jingwei Chen and Jian Qiu and Rinku Dewri}, title = {A Characterization of the Mass Surveillance Potential of Road Traffic Monitors}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {3--23}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/Chatterjee18, author = {Sumanta Chatterjee}, title = {Secure Moderated Bargaining Game}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {209--227}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/DasKSY18, author = {Sourav Das and Aashish Kolluri and Prateek Saxena and Haifeng Yu}, title = {(Invited Paper) on the Security of Blockchain Consensus Protocols}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {465--480}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/Es-SalhiEC18, author = {Khaoula Es{-}Salhi and David Espes and Nora Cuppens}, title = {{SONICS:} {A} Segmentation Method for Integrated {ICS} and Corporate System}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {231--250}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/GhosalC18, author = {Riddhi Ghosal and Sanjit Chatterjee}, title = {Privacy Preserving Multi-server k-means Computation over Horizontally Partitioned Data}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {189--208}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/KabilDCCHP18, author = {Alexandre Kabil and Thierry Duval and Nora Cuppens and G{\'{e}}rard Le Comte and Yoran Halgand and Christophe Ponchel}, title = {From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {272--287}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/KishoreKR18, author = {Sreesh Kishore and Renuka Kumar and Sreeranga Rajan}, title = {Towards Accuracy in Similarity Analysis of Android Applications}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {146--167}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/MarsalekPSZ18, author = {Alexander Marsalek and Bernd Pr{\"{u}}nster and Bojan Suzic and Thomas Zefferer}, title = {SeDiCom: {A} Secure Distributed Privacy-Preserving Communication Platform}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {345--363}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/MilajerdiEGV18, author = {Sadegh M. Milajerdi and Birhanu Eshete and Rigel Gjomemo and Venkat N. Venkatakrishnan}, title = {ProPatrol: Attack Investigation via Extracted High-Level Tasks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {107--126}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/NimmySA18, author = {K. Nimmy and Sriram Sankaran and Krishnashree Achuthan}, title = {A Novel Multi-factor Authentication Protocol for Smart Home Environments}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {44--63}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/PandaKM18, author = {Suryakanta Panda and Madhu Kumari and Samrat Mondal}, title = {{SGP:} {A} Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {129--145}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/PandaM18, author = {Suryakanta Panda and Samrat Mondal}, title = {drPass: {A} Dynamic and Reusable Password Generator Protocol}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {407--426}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/PareekP18, author = {Gaurav Pareek and B. R. Purushothama}, title = {Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {251--271}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/PathaniaRS18, author = {Amit Pathania and B. S. Radhika and Rudrapatna K. Shyamasundar}, title = {MySecPol: {A} Client-Side Policy Language for Safe and Secure Browsing}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {427--447}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/PatilS18, author = {Vishwas T. Patil and R. K. Shyamasundar}, title = {Efficacy of GDPR's Right-to-be-Forgotten on Facebook}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {364--385}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/PatilVS18, author = {Bhagyesh V. Patil and Parjanya Vyas and R. K. Shyamasundar}, title = {SecSmartLock: An Architecture and Protocol for Designing Secure Smart Locks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {24--43}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/PramanikRDAS18, author = {Jyotirmoy Pramanik and Partha Sarathi Roy and Sabyasachi Dutta and Avishek Adhikari and Kouichi Sakurai}, title = {Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {171--188}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/RajputG18, author = {Ajinkya Rajput and K. Gopinath}, title = {Analysis of Newer Aadhaar Privacy Models}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {386--404}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/SameerDN18, author = {Venkata Udaya Sameer and Ishaan Dali and Ruchira Naskar}, title = {A Deep Learning Based Digital Forensic Solution to Blind Source Identification of Facebook Images}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {291--303}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/TiwariP18, author = {Abhishek Tiwari and Rajarshi Pal}, title = {Gaze-Based Graphical Password Using Webcam}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {448--461}, publisher = {Springer}, year = {2018} }
@proceedings{DBLP:conf/iciss/2018, editor = {Vinod Ganapathy and Trent Jaeger and R. K. Shyamasundar}, title = {Information Systems Security - 14th International Conference, {ICISS} 2018, Bangalore, India, December 17-19, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11281}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iciss/AgrawallMBC17, author = {Akash Agrawall and Shubh Maheshwari and Projit Bandyopadhyay and Venkatesh Choppella}, title = {Modelling and Mitigation of Cross-Origin Request Attacks on Federated Identity Management Using Cross Origin Request Policy}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {263--282}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/BayouECC17, author = {Lyes Bayou and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {wIDS: {A} Multilayer {IDS} for Wireless-Based {SCADA} Systems}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {387--404}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/BkakriaGCCL17, author = {Anis Bkakria and Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jean{-}Louis Lanet}, title = {Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {127--145}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/ChaudhariDD17, author = {Payal Chaudhari and Manik Lal Das and Dipankar Dasgupta}, title = {Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {88--103}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/DasBSS17, author = {Moumita Das and Ansuman Banerjee and Nitesh K. Singh and Bhaskar Sardar}, title = {Performance Attacks on Branch Predictors in Embedded Processors with {SMT} Support}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {313--322}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/DaveSFLG17, author = {Jay Dave and Shweta Saharan and Parvez Faruki and Vijay Laxmi and Manoj Singh Gaur}, title = {Secure Random Encryption for Deduplicated Storage}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {164--176}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/GargM17, author = {Varun Garg and Anish Mathuria}, title = {On Automated Detection of Multi-Protocol Attacks Using {AVISPA}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {179--193}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/HonapL17, author = {Amrita Milind Honap and Wonjun Lee}, title = {Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {107--126}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/KhanJGN17, author = {Mohsin Khan and Kimmo J{\"{a}}rvinen and Philip Ginzboorg and Valtteri Niemi}, title = {On De-synchronization of User Pseudonyms in Mobile Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {347--366}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/KomeGCCF17, author = {Marco Lobe Kome and Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Vincent Frey}, title = {DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {243--262}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/KoshleyRH17, author = {Dileep Kumar Koshley and Sapana Rani and Raju Halder}, title = {Towards Generalization of Privacy Policy Specification and Property-Based Information Leakage}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {68--87}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/KumarKS17, author = {Mahender Kumar and Chittaranjan Padmanabha Katti and Prem Chandra Saxena}, title = {A Secure Anonymous E-Voting System Using Identity-Based Blind Signature Scheme}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {29--49}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/KumarRSG17, author = {Vineet Kumar and Aneek Roy and Sourya Sengupta and Sourav Sen Gupta}, title = {Parallelized Common Factor Attack on {RSA}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {303--312}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/ManciniMP17, author = {Luigi V. Mancini and Andrea Monti and Agostino Panico}, title = {{SOF} on Trial. The Technical and Legal Value of Battlefield Digital Forensics in Court}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {9--26}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/MimuraT17, author = {Mamoru Mimura and Hidema Tanaka}, title = {Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {146--163}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/MunkhbaatarMT17, author = {Bold Munkhbaatar and Mamoru Mimura and Hidema Tanaka}, title = {Dark Domain Name Attack: {A} New Threat to Domain Name System}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {405--414}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/NayakT17, author = {Sanjeet Kumar Nayak and Somanath Tripathy}, title = {{SEMFS:} Secure and Efficient Multi-keyword Fuzzy Search for Cloud Storage}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {50--67}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/NguyenMT17, author = {Son Duc Nguyen and Mamoru Mimura and Hidema Tanaka}, title = {Leveraging Man-in-the-middle DoS Attack with Internal {TCP} Retransmissions in Virtual Network}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {367--386}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/RaiDNM17, author = {Sandeep Rai and Rushang Dhanesha and Sreyans Nahata and Bernard Menezes}, title = {Malicious Application Detection on Android Smartphones with Enhanced Static-Dynamic Analysis}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {194--208}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/RajputG17, author = {Ajinkya Rajput and K. Gopinath}, title = {Towards a More Secure Aadhaar}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {283--300}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/RaoP17, author = {Routhu Srinivasa Rao and Alwyn Roshan Pais}, title = {An Enhanced Blacklist Method to Detect Phishing Websites}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {323--333}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/RathAS17, author = {Mayukh Rath and Shivali Agarwal and R. K. Shyamasundar}, title = {Semi Supervised {NLP} Based Classification of Malware Documents}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {334--344}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/SanthanamHKR17, author = {Ganesh Ram Santhanam and Benjamin Holland and Suresh C. Kothari and Nikhil Ranade}, title = {Human-on-the-Loop Automation for Detecting Software Side-Channel Vulnerabilities}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {209--230}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/TrivediD17, author = {Nachiket Trivedi and Manik Lal Das}, title = {MalDetec: {A} Non-root Approach for Dynamic Malware Detection in Android}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {231--240}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/Zatti17, author = {Stefano Zatti}, title = {The Protection of Space Missions: Threats and Cyber Threats}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {3--8}, publisher = {Springer}, year = {2017} }
@proceedings{DBLP:conf/iciss/2017, editor = {Rudrapatna K. Shyamasundar and Virendra Singh and Jaideep Vaidya}, title = {Information Systems Security - 13th International Conference, {ICISS} 2017, Mumbai, India, December 16-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10717}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/iciss/BagadeR16, author = {Sudhir Bagade and Vijay T. Raisinghani}, title = {{JITWORM:} Jitter Monitoring Based Wormhole Attack Detection in {MANET}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {444--458}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/BarikMG16, author = {Mridul Sankar Barik and Chandan Mazumdar and Amarnath Gupta}, title = {Network Vulnerability Analysis Using a Constrained Graph Data Model}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {263--282}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/CanardT16, author = {S{\'{e}}bastien Canard and Viet Cuong Trinh}, title = {An Efficient Certificateless Signature Scheme in the Standard Model}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {175--192}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/CanardT16a, author = {S{\'{e}}bastien Canard and Viet Cuong Trinh}, title = {Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {193--211}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/ChallaG16, author = {RatnaKumari Challa and VijayaKumari Gunta}, title = {Reed-Muller Code Based Symmetric Key Fully Homomorphic Encryption Scheme}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {499--508}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/ChamotraSRs16, author = {Saurabh Chamotra and Rakesh Kumar Sehgal and Sanjeev Ror and Bhupendra Singh}, title = {Honeypot Deployment in Broadband Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {479--488}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/ChorgheS16, author = {Sharvari Prakash Chorghe and Narendra Shekokar}, title = {A Solution to Detect Phishing in Android Devices}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {461--470}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/DeshmukhNA16, author = {Maroti Deshmukh and Neeta Nain and Mushtaq Ahmed}, title = {Enhanced Modulo Based Multi Secret Image Sharing Scheme}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {212--224}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/DessaiK16, author = {Kissan G. Gauns Dessai and Venkatesh V. Kamat}, title = {A Framework for Analyzing Associativity and Anonymity in Conventional and Electronic Summative Examinations}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {303--323}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/EssaouiniCC16, author = {Nada Essaouini and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Building a Fair System Using Access Rights}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {89--108}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/GajeraND16, author = {Hardik Gajera and Shruti Naik and Manik Lal Das}, title = {On the Security of "Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems"}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {324--335}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/GhoshalP16, author = {Sanat Ghoshal and Goutam Paul}, title = {Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {359--371}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/HarshaAS16, author = {T. Harsha and S. Asha and B. Soniya}, title = {Feature Selection for Effective Botnet Detection Based on Periodicity of Traffic}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {471--478}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/HartogZ16, author = {Jerry den Hartog and Nicola Zannone}, title = {Collaborative Access Decisions: Why Has My Decision Not Been Enforced?}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {109--130}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/HawannaKRJ16, author = {Varsharani Hawanna and Vrushali Y. Kulkarni and Rashmi Rane and Pooja Joshi}, title = {Risk Evaluation of {X.509} Certificates - {A} Machine Learning Application}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {372--389}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/JainCRS16, author = {Lokesh Jain and Aditya Chandran and Sanjay Rawat and Kannan Srinathan}, title = {Discovering Vulnerable Functions by Extrapolation: {A} Control-Flow Graph Similarity Based Approach}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {532--542}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/JainGLM16, author = {Vineeta Jain and Manoj Singh Gaur and Vijay Laxmi and Mohamed Mosbah}, title = {Detection of SQLite Database Vulnerabilities in Android Apps}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {521--531}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/JanaH16, author = {Angshuman Jana and Raju Halder}, title = {Defining Abstract Semantics for Static Dependence Analysis of Relational Database Applications}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {151--171}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/JangiralaMM16, author = {Srinivas Jangirala and Dheerendra Mishra and Sourav Mukhopadhyay}, title = {Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {45--65}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/KarN16, author = {Jayaprakash Kar and Kshirasagar Naik}, title = {Generic Construction of Certificateless Signcryption Scheme}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {489--498}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/KongsgardNME16, author = {Kyrre Wahl Kongsg{\aa}rd and Nils Agne Nordbotten and Federico Mancini and Paal E. Engelstad}, title = {Data Loss Prevention Based on Text Classification in Controlled Environments}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {131--150}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/KukkalaSI16, author = {Varsha Bhat Kukkala and Jaspal Singh Saini and S. R. S. Iyengar}, title = {Privacy Preserving Network Analysis of Distributed Social Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {336--355}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/MaheshwariM16, author = {Ankit Maheshwari and Samrat Mondal}, title = {{SPOSS:} Secure Pin-Based-Authentication Obviating Shoulder Surfing}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {66--86}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/MukherjeeSRDG16, author = {Subhojeet Mukherjee and Hossein Shirazi and Indrakshi Ray and Jeremy Daily and Rose F. Gamble}, title = {Practical DoS Attacks on Embedded Networks in Commercial Vehicles}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {23--42}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/NandaNHJ16, author = {Ashish Nanda and Priyadarsi Nanda and Xiangjian He and Aruna Jamdagni}, title = {A Secure Routing Scheme for Wireless Mesh Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {393--408}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/SameerSN16, author = {Venkata Udaya Sameer and S. Sugumaran and Ruchira Naskar}, title = {Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {409--425}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/SheelaST16, author = {S. J. Sheela and K. V. Suresh and Deepaknath Tandur}, title = {Performance Evaluation of Modified Henon Map in Image Encryption}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {225--240}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/SilvaRSM16, author = {Douglas Sim{\~{o}}es Silva and Davi Resner and Rick Lopes de Souza and Jean Everson Martina}, title = {Formal Verification of a Cross-Layer, Trustful Space-Time Protocol for Wireless Sensor Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {426--443}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/SinghTB16, author = {Surendra Singh and Sachin Tripathi and Suvadip Batabyal}, title = {Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {283--300}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/Tanaka16, author = {Hidema Tanaka}, title = {Network Counter-Attack Strategy by Topology Map Analysis}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {243--262}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/TeichelSM16, author = {Kristof Teichel and Dieter Sibold and Stefan Milius}, title = {An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {3--22}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/YukselHE16, author = {{\"{O}}mer Y{\"{u}}ksel and Jerry den Hartog and Sandro Etalle}, title = {Towards Useful Anomaly Detection for Back Office Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {509--520}, publisher = {Springer}, year = {2016} }
@proceedings{DBLP:conf/iciss/2016, editor = {Indrajit Ray and Manoj Singh Gaur and Mauro Conti and Dheeraj Sanghi and V. Kamakoti}, title = {Information Systems Security - 12th International Conference, {ICISS} 2016, Jaipur, India, December 16-20, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10063}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/iciss/AgrawalDMS15, author = {Sarita Agrawal and Manik Lal Das and Anish Mathuria and Sanjay Srivastava}, title = {Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {419--440}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/BanerjeeMR15, author = {Satyajit Banerjee and Debapriyay Mukhopadhyay and Suman Roy}, title = {A New Threshold Certification Scheme Based Defense Against Sybil Attack for Sensor Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {562--572}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/BennettRF15, author = {Phillipa Bennett and Indrakshi Ray and Robert B. France}, title = {Modeling of Online Social Network Policies Using an Attribute-Based Access Control Framework}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {79--97}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/BhattacharjeeM15, author = {Suchismita Bhattacharjee and Ningrinla Marchang}, title = {Attack-Resistant Trust-Based Weighted Majority Game Rule for Spectrum Sensing in Cognitive Radio Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {441--460}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/BollmannLMS15, author = {Dominik Bollmann and Steffen Lortz and Heiko Mantel and Artem Starostin}, title = {An Automatic Inference of Minimal Security Types}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {395--415}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/ChangSS15, author = {Donghoon Chang and Somitra Kumar Sanadhya and Nishant Sharma}, title = {New {HMAC} Message Patches: Secret Patch and CrOw Patch}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {285--302}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/ChaudhariDM15, author = {Payal Chaudhari and Manik Lal Das and Anish Mathuria}, title = {On Anonymous Attribute Based Encryption}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {378--392}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/Choudhury15, author = {Ashish Choudhury}, title = {Asynchronous Error-Decodable Secret-Sharing and Its Application}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {364--377}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/DasA15, author = {Angsuman Das and Avishek Adhikari}, title = {Plaintext Checkable Signcryption}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {324--333}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/DasSB15, author = {Moumita Das and Bhaskar Sardar and Ansuman Banerjee}, title = {Attacks on Branch Predictors: An Empirical Exploration}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {511--520}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/DeeringSK15, author = {Tom Deering and Ganesh Ram Santhanam and Suresh C. Kothari}, title = {FlowMiner: Automatic Summarization of Library Data-Flow for Malware Analysis}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {171--191}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/Ganapathy15, author = {Vinod Ganapathy}, title = {Reflections on the Self-service Cloud Computing Project}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {36--57}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/GanselSGFDRMK15, author = {Simon Gansel and Stephan Schnitzer and Ahmad Gilbeau{-}Hammoud and Viktor Friesen and Frank D{\"{u}}rr and Kurt Rothermel and Christian Maih{\"{o}}fer and Ulrich Kr{\"{a}}mer}, title = {Context-Aware Access Control in Novel Automotive {HMI} Systems}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {118--138}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/GodefroyTHM15, author = {Erwan Godefroy and Eric Totel and Michel Hurfin and Fr{\'{e}}d{\'{e}}ric Majorczyk}, title = {Assessment of an Automatic Correlation Rules Generator}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {207--224}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/JhaSAV15, author = {Sadhana Jha and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya}, title = {Enforcing Separation of Duty in Attribute Based Access Control Systems}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {61--78}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/KandarD15, author = {Shyamalendu Kandar and Bibhas Chandra Dhara}, title = {A (k, n) Multi Secret Sharing Scheme Using Two Variable One Way Function with Less Public Values}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {532--541}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/KosugeITK15, author = {Haruhisa Kosuge and Keisuke Iwai and Hidema Tanaka and Takakazu Kurokawa}, title = {Search Algorithm of Precise Integral Distinguisher of Byte-Based Block Cipher}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {303--323}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/KunzFHP15, author = {Michael Kunz and Ludwig Fuchs and Matthias Hummer and G{\"{u}}nther Pernul}, title = {Introducing Dynamic Identity and Access Management in Organizations}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {139--158}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/LabatiGMPSS15, author = {Ruggero Donida Labati and Angelo Genovese and Enrique Mu{\~{n}}oz Ballester and Vincenzo Piuri and Fabio Scotti and Gianluca Sforza}, title = {Automated Border Control Systems: Biometric Challenges and Research Trends}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {11--20}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/LiCCCFJ15, author = {Yanhuang Li and Nora Cuppens{-}Boulahia and Jean{-}Michel Crom and Fr{\'{e}}d{\'{e}}ric Cuppens and Vincent Frey and Xiaoshu Ji}, title = {Similarity Measure for Security Policies in Service Provider Selection}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {227--242}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/MeenpalB15, author = {Toshanlal Meenpal and A. K. Bhattacharjee}, title = {Watermark Removal Attack Extended to Forgery Against Correlation-Based Watermarking Schemes}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {463--479}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/MehtaSD15, author = {Punit Mehta and Jigar Sharda and Manik Lal Das}, title = {SQLshield: Preventing {SQL} Injection Attacks by Modifying User Input Data}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {192--206}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/MukherjeeDBD15, author = {Imon Mukherjee and Biswajita Datta and Reeturaj Banerjee and Srijan Das}, title = {{DWT} Difference Modulation Based Novel Steganographic Algorithm}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {573--582}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/ParaboschiBM15, author = {Stefano Paraboschi and Enrico Bacis and Simone Mutti}, title = {Extending Mandatory Access Control Policies in Android}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {21--35}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/Paul15, author = {Goutam Paul}, title = {Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {161--170}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/PrandlLP15, author = {Stefan Prandl and Mihai M. Lazarescu and Duc{-}Son Pham}, title = {A Study of Web Application Firewall Solutions}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {501--510}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/PushkarGG15, author = {Anant Pushkar and Nirnay Ghosh and Soumya K. Ghosh}, title = {A Statistical Approach to Detect Anomalous User Requests in SaaS Cloud-Centric Collaborations}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {243--262}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/Rao15, author = {Y. Sreenivasa Rao}, title = {Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {521--531}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/RoyCN15, author = {Aniket Roy and Rajat Subhra Chakraborty and Ruchira Naskar}, title = {Reversible Color Image Watermarking in the YCoCg-R Color Space}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {480--498}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/SaranaRSVA15, author = {Prasuna Sarana and Arindam Roy and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {Role Mining in the Presence of Separation of Duty Constraints}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {98--117}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/Sarkar15, author = {Santanu Sarkar}, title = {A New Distinguisher on Grain v1 for 106 Rounds}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {334--344}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/SharmaJ15, author = {Dhruti Sharma and Devesh Jinwala}, title = {Functional Encryption in IoT E-Health Care System}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {345--363}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/ShyamS15, author = {Radhey Shyam and Yogendra Narain Singh}, title = {Robustness of Score Normalization in Multibiometric Systems}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {542--550}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/SomaniJTPGS15, author = {Gaurav Somani and Abhinav Johri and Mohit Taneja and Utkarsh Pyne and Manoj Singh Gaur and Dheeraj Sanghi}, title = {{DARAC:} DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {263--282}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/SusheelKS15, author = {S. Susheel and N. V. Narendra Kumar and R. K. Shyamasundar}, title = {Enforcing Secure Data Sharing in Web Application Development Frameworks Like Django Through Information Flow Control}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {551--561}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/VimercatiFS15, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Pierangela Samarati}, title = {Data Security Issues in Cloud Scenarios}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {3--10}, publisher = {Springer}, year = {2015} }
@proceedings{DBLP:conf/iciss/2015, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Information Systems Security - 11th International Conference, {ICISS} 2015, Kolkata, India, December 16-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9478}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/iciss/BasuMC14, author = {Aditya Basu and Anish Mathuria and Nagendra Chowdary}, title = {Automatic Generation of Compact Alphanumeric Shellcodes for x86}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {399--410}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/BhattacharjeeSM14, author = {Jaya Bhattacharjee and Anirban Sengupta and Chandan Mazumdar}, title = {A Formal Methodology for Modeling Threats to Enterprise Assets}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {149--166}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/BiskupP14, author = {Joachim Biskup and Marcel Preu{\ss}}, title = {Inference-Proof Data Publishing by Minimally Weakening a Database Instance}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {30--49}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/BiswalPR14, author = {Sumitra Biswal and Goutam Paul and Shashwat Raizada}, title = {Preserving Privacy in Location-Based Services Using Sudoku Structures}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {448--463}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/ChakrabortyM14, author = {Nilesh Chakraborty and Samrat Mondal}, title = {An Improved Methodology towards Providing Immunity against Weak Shoulder Surfing Attack}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {298--317}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/ChoudhuryRS14, author = {Hiten Choudhury and Basav Roychoudhury and Dilip Kr. Saikia}, title = {A Security Extension Providing User Anonymity and Relaxed Trust Requirement in Non-3GPP Access to the {EPS}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {226--244}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/CybenkoJW014, author = {George Cybenko and Sushil Jajodia and Michael P. Wellman and Peng Liu}, title = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {1--8}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/DecroixBJN14, author = {Koen Decroix and Denis Butin and Joachim Jansen and Vincent Naessens}, title = {Inferring Accountability from Trust Perceptions}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {69--88}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/DoanDNT14, author = {Thong M. Doan and Han N. Dinh and Nam Tuan Nguyen and Phuoc T. Tran}, title = {Location Obfuscation Framework for Training-Free Localization System}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {464--476}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/GayHM14, author = {Richard Gay and Jinwei Hu and Heiko Mantel}, title = {CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {378--398}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/GuptaG14, author = {Puneet Gupta and Phalguni Gupta}, title = {A Vein Biometric Based Authentication System}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {425--436}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/HalderDGM14, author = {Biswajit Halder and Rajkumar Darbar and Utpal Garain and Abhoy Chand Mondal}, title = {Analysis of Fluorescent Paper Pulps for Detecting Counterfeit Indian Paper Money}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {411--424}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/HeorhiadiFRS14, author = {Victor Heorhiadi and Seyed Kaveh Fayaz and Michael K. Reiter and Vyas Sekar}, title = {{SNIPS:} {A} Software-Defined Approach for Scaling Intrusion Prevention Systems via Offloading}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {9--29}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/JhaSVA14, author = {Sadhana Jha and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {Temporal {RBAC} Security Analysis Using Logic Programming in the Presence of Administrative Policies}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {129--148}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/KhanCBGP14, author = {Wilayat Khan and Stefano Calzavara and Michele Bugliesi and Willem De Groef and Frank Piessens}, title = {Client Side Web Session Integrity as a Non-interference Property}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {89--108}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/LiDL14, author = {Xiaolei Li and Xinshu Dong and Zhenkai Liang}, title = {A Usage-Pattern Perspective for Privacy Ranking of Android Apps}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {245--256}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/MalviyaN14, author = {Pankaj Malviya and Ruchira Naskar}, title = {Digital Forensic Technique for Double Compression Based {JPEG} Image Forgery Detection}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {437--447}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/MayerVK14, author = {Peter Mayer and Melanie Volkamer and Michaela Kauer}, title = {Authentication Schemes - Comparison and Effective Password Spaces}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {204--225}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/PadhyaJ14, author = {Mukti Padhya and Devesh Jinwala}, title = {A Novel Approach for Searchable {CP-ABE} with Hidden Ciphertext-Policy}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {167--184}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/PaulSM14, author = {Goutam Paul and Pratik Sarkar and Sarbajit Mukherjee}, title = {Towards a More Democratic Mining in Bitcoins}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {185--203}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/RamanujamSS14, author = {Ramaswamy Ramanujam and Vaishnavi Sundararajan and S. P. Suresh}, title = {Extending Dolev-Yao with Assertions}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {50--68}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/RovelliV14, author = {Paolo Rovelli and Ymir Vigfusson}, title = {{PMDS:} Permission-Based Malware Detection System}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {338--357}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/RoySM14, author = {Arindam Roy and Shamik Sural and Arun Kumar Majumdar}, title = {Impact of Multiple t-t {SMER} Constraints on Minimum User Requirement in {RBAC}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {109--128}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/SainiGLSC14, author = {Anil Saini and Manoj Singh Gaur and Vijay Laxmi and Tushar Singhal and Mauro Conti}, title = {Privacy Leakage Attacks in Browsers by Colluding Extensions}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {257--276}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/TelikicherlaCB14, author = {Krishna Chaitanya Telikicherla and Venkatesh Choppella and Bruhadeshwar Bezawada}, title = {{CORP:} {A} Browser Policy to Mitigate Web Infiltration Attacks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {277--297}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/ThakurV14, author = {Tanmay Thakur and Rakesh M. Verma}, title = {Catching Classical and Hijack-Based Phishing Attacks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {318--337}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/VernotteDLLPP14, author = {Alexandre Vernotte and Fr{\'{e}}d{\'{e}}ric Dadeau and Franck Lebeau and Bruno Legeard and Fabien Peureux and Fran{\c{c}}ois Piat}, title = {Efficient Detection of Multi-step Cross-Site Scripting Vulnerabilities}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {358--377}, publisher = {Springer}, year = {2014} }
@proceedings{DBLP:conf/iciss/2014, editor = {Atul Prakash and Rudrapatna K. Shyamasundar}, title = {Information Systems Security - 10th International Conference, {ICISS} 2014, Hyderabad, India, December 16-20, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8880}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/iciss/BagRR13, author = {Samiran Bag and Sushmita Ruj and Bimal K. Roy}, title = {Jamming Resistant Schemes for Wireless Communication: {A} Combinatorial Approach}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {43--62}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/ChaturvediMM13, author = {Ankita Chaturvedi and Dheerendra Mishra and Sourav Mukhopadhyay}, title = {Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {63--77}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/CliftonA13, author = {Chris Clifton and Balamurugan Anandan}, title = {Challenges and Opportunities for Security with Differential Privacy}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {1--13}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/DasA13, author = {Angsuman Das and Avishek Adhikari}, title = {Signcryption from Randomness Recoverable {PKE} Revisited}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {78--90}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/DeP13, author = {Sourya Joyee De and Asim K. Pal}, title = {Auctions with Rational Adversary}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {91--105}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/DecroixLDN13, author = {Koen Decroix and Jorn Lapon and Bart De Decker and Vincent Naessens}, title = {A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {106--120}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/HachanaCCAM13, author = {Safa{\`{a}} Hachana and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Vijay Atluri and Stephane Morucci}, title = {Policy Mining: {A} Bottom-Up Approach toward a Model Based Firewall Management}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {133--147}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/JaumeATM13, author = {Mathieu Jaume and Radoniaina Andriatsimandefitra and Val{\'{e}}rie Viet Triem Tong and Ludovic M{\'{e}}}, title = {Secure States versus Secure Executions - From Access Control to Flow Control}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {148--162}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/KalutarageSZJ13, author = {Harsha K. Kalutarage and Siraj A. Shaikh and Qin Zhou and Anne E. James}, title = {Monitoring for Slow Suspicious Activities Using a Target Centric Approach}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {163--168}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/KerschbaumHKHSST13, author = {Florian Kerschbaum and Martin H{\"{a}}rterich and Mathias Kohler and Isabelle Hang and Andreas Schaad and Axel Schr{\"{o}}pfer and Walter Tighzert}, title = {An Encrypted In-Memory Column-Store: The Onion Selection Problem}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {14--26}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/KhalidHCP13, author = {Ayesha Khalid and Muhammad Hassan and Anupam Chattopadhyay and Goutam Paul}, title = {RAPID-FeinSPN: {A} Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {169--190}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/KumarJGU13, author = {Sheethal Kumar and Pai B. J. Jaipal and Sourav Sen Gupta and Vigesh R. Ungrapalli}, title = {Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {199--213}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/KumarMD13, author = {Naveen Kumar and Anish Mathuria and Manik Lal Das}, title = {Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme - (Short Paper)}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {191--198}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/LorenziVSA13, author = {David Lorenzi and Jaideep Vaidya and Shamik Sural and Vijayalakshmi Atluri}, title = {Web Services Based Attacks against Image CAPTCHAs}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {214--229}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/MaitraG13, author = {Subhamoy Maitra and Sourav Sen Gupta}, title = {New Long-Term Glimpse of {RC4} Stream Cipher}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {230--238}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/MaityH13, author = {Soumyadev Maity and Ramesh C. Hansdah}, title = {A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {239--246}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/MishraM13, author = {Dheerendra Mishra and Sourav Mukhopadhyay}, title = {Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {247--254}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/MizunoITK13, author = {Hiroaki Mizuno and Keisuke Iwai and Hidema Tanaka and Takakazu Kurokawa}, title = {Information Theoretical Analysis of Side-Channel Attack}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {255--269}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/MukherjeeBB13, author = {Nabanita Mukherjee and Ayon Bhattacharya and Siddhartha Sekhar Bose}, title = {Evolutionary Multibit Grouping Steganographic Algorithm}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {285--296}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/MukherjeeP13, author = {Imon Mukherjee and Goutam Paul}, title = {Efficient Multi-bit Image Steganography in Spatial Domain}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {270--284}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/NgP13, author = {Beng Heng Ng and Atul Prakash}, title = {Let the Right One in: Discovering and Mitigating Permission Gaps}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {297--313}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/OktayKKM13, author = {Kerim Yasin Oktay and Vaibhav Khadilkar and Murat Kantarcioglu and Sharad Mehrotra}, title = {Risk Aware Approach to Data Confidentiality in Cloud Computing}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {27--42}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/PradweapH13, author = {R. V. Pradweap and R. C. Hansdah}, title = {A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication {(RAHAA)} in {VANET}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {314--328}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/RaoD13, author = {Y. Sreenivasa Rao and Ratna Dutta}, title = {Recipient Anonymous Ciphertext-Policy Attribute Based Encryption}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {329--344}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/SarkarGM13, author = {Santanu Sarkar and Sourav Sen Gupta and Subhamoy Maitra}, title = {Error Correction of Partially Exposed {RSA} Private Keys from {MSB} Side}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {345--359}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/SaxenaGB13, author = {Anuj Shanker Saxena and Vikram Goyal and Debajyoti Bera}, title = {Efficient Enforcement of Privacy for Moving Object Trajectories}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {360--374}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/SharmaSAV13, author = {Manisha Sharma and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya}, title = {An Administrative Model for Spatio-Temporal Role Based Access Control}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {375--389}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/SobhdelJ13, author = {Yasser Sobhdel and Rasool Jalili}, title = {A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {390--401}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/UmadeviS13, author = {Ganugula Umadevi and Ashutosh Saxena}, title = {Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {121--132}, publisher = {Springer}, year = {2013} }
@proceedings{DBLP:conf/iciss/2013, editor = {Aditya Bagchi and Indrakshi Ray}, title = {Information Systems Security - 9th International Conference, {ICISS} 2013, Kolkata, India, December 16-20, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8303}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/iciss/AgrawalRDML12, author = {Sarita Agrawal and Rodrigo Roman and Manik Lal Das and Anish Mathuria and Javier L{\'{o}}pez}, title = {A Novel Key Update Protocol in Mobile Sensor Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {194--207}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/AmrutkarSVT12, author = {Chaitrali Amrutkar and Kapil Singh and Arunabh Verma and Patrick Traynor}, title = {VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {16--34}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/BhattacharyaDCIB12, author = {Anup Kumar Bhattacharya and Abhijit Das and Dipanwita Roy Chowdhury and Aravind Iyer and Debojyoti Bhattacharya}, title = {Autonomous Certification with List-Based Revocation for Secure {V2V} Communication}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {208--222}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/BijonKS12, author = {Khalid Zaman Bijon and Ram Krishnan and Ravi S. Sandhu}, title = {Risk-Aware {RBAC} Sessions}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {59--74}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/BoltonWZ12, author = {Matthew L. Bolton and Celeste M. Wallace and Lenore D. Zuck}, title = {On Policies and Intents}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {104--118}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/ChandraY12, author = {Girish Chandra and Divakar Yadav}, title = {Verification of Money Atomicity in Digital Cash Based Payment System}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {249--264}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/GhasemiNHNJ12, author = {Simin Ghasemi and Morteza Noferesti and Mohammad Ali Hadavi and Sadegh Dorri Nogoorani and Rasool Jalili}, title = {Correctness Verification in Database Outsourcing: {A} Trust-Based Fake Tuples Approach}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {343--351}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/Hassan12, author = {Doaa Hassan}, title = {Tracking Insecure Information Flows: {A} Prototype Evaluator in {ASF+SDF}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {310--326}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/HowladerKM12, author = {Jaydeep Howlader and Jayanta Kar and Ashis Kumar Mal}, title = {Coercion Resistant {MIX} for Electronic Auction}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {238--248}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/Kruegel12, author = {Christopher Kruegel}, title = {Fighting Malicious Software}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {1--15}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/LiPY12, author = {Weihan Li and Brajendra Panda and Qussai Yaseen}, title = {Mitigating Insider Threat on Database Integrity}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {223--237}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/LorenziVUSA12, author = {David Lorenzi and Jaideep Vaidya and Emre Uzun and Shamik Sural and Vijayalakshmi Atluri}, title = {Attacking Image Based CAPTCHAs Using Image Recognition Techniques}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {327--342}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/MaityG12, author = {Soumya Maity and Soumya Kanti Ghosh}, title = {A Cognitive Trust Model for Access Control Framework in {MANET}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {75--88}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/MaityH12, author = {Soumyadev Maity and Ramesh C. Hansdah}, title = {Certificate-Less On-Demand Public Key Management {(CLPKM)} for Self-organized MANETs}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {277--293}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/MatamT12, author = {Rakesh Matam and Somanath Tripathy}, title = {Defence against Wormhole Attacks in Wireless Mesh Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {181--193}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/Naldurg12, author = {Prasad Naldurg}, title = {Foundations of Dynamic Access Control}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {44--58}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/NaskarC12, author = {Ruchira Naskar and Rajat Subhra Chakraborty}, title = {Fuzzy Inference Rule Based Reversible Watermarking for Digital Images}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {149--163}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/NatarajanYZ12, author = {Vivek Natarajan and Yi Yang and Sencun Zhu}, title = {Secure Trust Metadata Management for Mobile Ad-Hoc Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {164--180}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/OjamaaD12, author = {Andres Ojamaa and Karl D{\"{u}}{\"{u}}na}, title = {Security Assessment of Node.js Platform}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {35--43}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/PaulDMR12, author = {Goutam Paul and Ian Davidson and Imon Mukherjee and S. S. Ravi}, title = {Keyless Steganography in Spatial Domain Using \emph{Energetic} Pixels}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {134--148}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/PeinadoF12, author = {Alberto Peinado and Amparo F{\'{u}}ster{-}Sabater}, title = {Cryptographic Analysis of a Type of Sequence Generators}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {265--276}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/RaoD12, author = {Y. Sreenivasa Rao and Ratna Dutta}, title = {Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {294--309}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/SwinnenSPP12, author = {Arne Swinnen and Raoul Strackx and Pieter Philippaerts and Frank Piessens}, title = {ProtoLeaks: {A} Reliable and Protocol-Independent Network Covert Channel}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {119--133}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/ToumiAC12, author = {Khalifa Toumi and C{\'{e}}sar Andr{\'{e}}s and Ana R. Cavalli}, title = {Trust-orBAC: {A} Trust Access Control Model in Multi-Organization Environments}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {89--103}, publisher = {Springer}, year = {2012} }
@proceedings{DBLP:conf/iciss/2012, editor = {Venkat N. Venkatakrishnan and Diganta Goswami}, title = {Information Systems Security, 8th International Conference, {ICISS} 2012, Guwahati, India, December 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7671}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/iciss/AhmedRA11, author = {Faraz Ahmed and M. Zubair Rafique and Muhammad Abulaish}, title = {A Data Mining Framework for Securing 3G Core Network from {GTP} Fuzzing Attacks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {280--293}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/BanerjeeMBCN11, author = {Prithu Banerjee and Mahasweta Mitra and Ferdous A. Barbhuiya and Sandip Chakraborty and Sukumar Nandi}, title = {An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {294--308}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/BasuSS11, author = {Atanu Basu and Indranil Sengupta and Jamuna Kanta Sing}, title = {Secured Cloud Storage Scheme Using {ECC} Based Key Management in User Hierarchy}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {175--189}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/BurghouwtSS11, author = {Pieter Burghouwt and Marcel E. M. Spruit and Henk J. Sips}, title = {Towards Detection of Botnet Communication through Social Media by Monitoring User Activity}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {131--143}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/CavallaroS11, author = {Lorenzo Cavallaro and R. Sekar}, title = {Taint-Enhanced Anomaly Detection}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {160--174}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/DasMPS11, author = {Apurba Das and Subhamoy Maitra and Goutam Paul and Santanu Sarkar}, title = {Some Combinatorial Results towards State Recovery Attack on {RC4}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {204--214}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/DattaBCDGJKS11, author = {Anupam Datta and Jeremiah Blocki and Nicolas Christin and Henry DeYoung and Deepak Garg and Limin Jia and Dilsun Kirli Kaynar and Arunesh Sinha}, title = {Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {1--27}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/Enck11, author = {William Enck}, title = {Defending Users against Smartphone Apps: Techniques and Future Directions}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {49--70}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/GadyatskayaLM11, author = {Olga Gadyatskaya and Eduardo Lostal and Fabio Massacci}, title = {Load Time Security Verification}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {250--264}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/GeneiatakisPK11, author = {Dimitris Geneiatakis and Georgios Portokalidis and Angelos D. Keromytis}, title = {A Multilayer Overlay Network Architecture for Enhancing {IP} Services Availability against DoS}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {322--336}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/Goyal11, author = {Vipul Goyal}, title = {Secure Composition of Cryptographic Protocols}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {71}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/GuptaS11, author = {Indivar Gupta and P. K. Saxena}, title = {Distributed Signcryption from Pairings}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {215--234}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/GuptaSX11, author = {Puneet Gupta and Scott D. Stoller and Zhongyuan Xu}, title = {Abductive Analysis of Administrative Policies in Rule-Based Access Control}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {116--130}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/HuangSEKS11, author = {Yan Huang and Chih{-}Hao Shen and David Evans and Jonathan Katz and Abhi Shelat}, title = {Efficient Secure Computation with Garbled Circuits}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {28--48}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/JaumeTM11, author = {Mathieu Jaume and Val{\'{e}}rie Viet Triem Tong and Ludovic M{\'{e}}}, title = {Flow Based Interpretation of Access Control: Detection of Illegal Information Flows}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {72--86}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/KrishnanS11, author = {Ram Krishnan and Ravi S. Sandhu}, title = {Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {102--115}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/KuhnhauserP11, author = {Winfried E. K{\"{u}}hnhauser and Anja P{\"{o}}lck}, title = {Towards Access Control Model Engineering}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {379--382}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/MaggiBSZ11, author = {Federico Maggi and Andrea Bellini and Guido Salvaneschi and Stefano Zanero}, title = {Finding Non-trivial Malware Naming Inconsistencies}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {144--159}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/NadkarniMP11, author = {Tanusha S. Nadkarni and Radhesh Mohandas and Alwyn R. Pais}, title = {IFrandbox - Client Side Protection from Malicious Injected Iframes}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {383--386}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/NaskarC11, author = {Ruchira Naskar and Rajat Subhra Chakraborty}, title = {Reversible Image Watermarking through Coordinate Logic Operation Based Prediction}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {190--203}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/NoferestiHJ11, author = {Morteza Noferesti and Mohammad Ali Hadavi and Rasool Jalili}, title = {A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {374--378}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/RagavanP11, author = {Harini Ragavan and Brajendra Panda}, title = {Mitigation of Malicious Modifications by Insiders in Databases}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {337--351}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/SaxenaPGB11, author = {Anuj Shanker Saxena and Mayank Pundir and Vikram Goyal and Debajyoti Bera}, title = {Preserving Location Privacy for Continuous Queries on Known Route}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {265--279}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/SchneiderPE11, author = {Christian A. Schneider and Jonas Pfoh and Claudia Eckert}, title = {A Universal Semantic Bridge for Virtual Machine Introspection}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {370--373}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/TedescoHS11, author = {Filippo Del Tedesco and Sebastian Hunt and David Sands}, title = {A Semantic Hierarchy for Erasure Policies}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {352--369}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/ThomasCC11, author = {Julien A. Thomas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Consistency Policies for Dynamic Information Systems with Declassification Flows}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {87--101}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/VeeningenWZ11, author = {Meilof Veeningen and Benne de Weger and Nicola Zannone}, title = {Formal Privacy Analysis of Communication Protocols for Identity Management}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {235--249}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/YadavLR11, author = {Ravi Shankar Yadav and Praveen Likhar and M. Keshava Rao}, title = {SecWEM: {A} Security Solution for Web Based E-mail}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {309--321}, publisher = {Springer}, year = {2011} }
@proceedings{DBLP:conf/iciss/2011, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Information Systems Security - 7th International Conference, {ICISS} 2011, Kolkata, India, December 15-19, 2011, Procedings}, series = {Lecture Notes in Computer Science}, volume = {7093}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iciss/AckerNPYP10, author = {Steven {Van Acker} and Nick Nikiforakis and Pieter Philippaerts and Yves Younan and Frank Piessens}, title = {ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {156--170}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/BeckerMB10, author = {Moritz Y. Becker and Alexander Malkis and Laurent Bussard}, title = {A Practical Generic Privacy Language}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {125--139}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/BirgissonRS10, author = {Arnar Birgisson and Alejandro Russo and Andrei Sabelfeld}, title = {Unifying Facets of Information Integrity}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {48--65}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/CaiSLDL10, author = {Shaoying Cai and Chunhua Su and Yingjiu Li and Robert H. Deng and Tieyan Li}, title = {Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {246--260}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/ChenXHMX10, author = {Ping Chen and Xiao Xing and Hao Han and Bing Mao and Li Xie}, title = {Efficient Detection of the Return-Oriented Programming Malicious Code}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {140--155}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/DaoS10, author = {Thanh{-}Binh Dao and Etsuya Shibayama}, title = {Coverage Criteria for Automatic Security Testing of Web Applications}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {111--124}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/FaghihAJ10, author = {Fathieh Faghih and Morteza Amini and Rasool Jalili}, title = {Specification of History Based Constraints for Access Control in Conceptual Level}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {186--200}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/GiffinS10, author = {Jonathon T. Giffin and Abhinav Srivastava}, title = {Attribution of Malicious Behavior}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {28--47}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/HalderC10, author = {Raju Halder and Agostino Cortesi}, title = {A Persistent Public Watermarking of Relational Databases}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {216--230}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/Jaume10, author = {Mathieu Jaume}, title = {Security Rules \emph{versus} Security Properties}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {231--245}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/KumarSG10, author = {Ravi Kumar and Shamik Sural and Arobinda Gupta}, title = {Mining {RBAC} Roles under Cardinality Constraint}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {171--185}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/Myers10, author = {Andrew C. Myers}, title = {Toward Securely Programming the Internet}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {27}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/NandiPV10, author = {Mridul Nandi and Stefan Popoveniuc and Poorvi L. Vora}, title = {Stamp-It: {A} Method for Enhancing the Universal Verifiability of {E2E} Voting Systems}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {81--95}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/Rajamani10, author = {Sriram K. Rajamani}, title = {Analyzing Explicit Information Flow}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {1--2}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/SrinivasanDGB10, author = {Raghunathan Srinivasan and Partha Dasgupta and Tushar Gohad and Amiya Bhattacharya}, title = {Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote Attestation}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {66--80}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/VenkatakrishnanBLZGG10, author = {V. N. Venkatakrishnan and Prithvi Bisht and Mike Ter Louw and Michelle Zhou and Kalpana Gondi and Karthik Thotta Ganesh}, title = {WebAppArmor: {A} Framework for Robust Prevention of Attacks on Web Applications (Invited Paper)}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {3--26}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/WangZP10, author = {Wei Wang and Xiangliang Zhang and Georgios Pitsilis}, title = {Abstracting Audit Data for Lightweight Intrusion Detection}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {201--215}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/ZhouBV10, author = {Michelle Zhou and Prithvi Bisht and V. N. Venkatakrishnan}, title = {Strengthening {XSRF} Defenses for Legacy Web Applications Using Whitebox Analysis and Transformation}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {96--110}, publisher = {Springer}, year = {2010} }
@proceedings{DBLP:conf/iciss/2010, editor = {Somesh Jha and Anish Mathuria}, title = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iciss/AdjedjBCK09, author = {Michael Adjedj and Julien Bringer and Herv{\'{e}} Chabanne and Bruno Kindarji}, title = {Biometric Identification over Encrypted Data Made Feasible}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {86--100}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/BeraGD09, author = {Padmalochan Bera and Soumya Kanti Ghosh and Pallab Dasgupta}, title = {Formal Verification of Security Policy Implementations in Enterprise Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {117--131}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/BhattacharyaC09, author = {Sukriti Bhattacharya and Agostino Cortesi}, title = {A Generic Distortion Free Watermarking Technique for Relational Databases}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {252--264}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/ChenXSYMX09, author = {Ping Chen and Hai Xiao and Xiaobin Shen and Xinchun Yin and Bing Mao and Li Xie}, title = {{DROP:} Detecting Return-Oriented Programming Malicious Code}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {163--177}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/DacierPT09, author = {Marc Dacier and Van{-}Hau Pham and Olivier Thonnard}, title = {The {WOMBAT} Attack Attribution Method: Some Results}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {19--37}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/Frias-MartinezSK09, author = {Vanessa Fr{\'{\i}}as{-}Mart{\'{\i}}nez and Salvatore J. Stolfo and Angelos D. Keromytis}, title = {{BARTER:} Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {193--207}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/FuZL09, author = {Ge Fu and Hong Zhu and Yingjiu Li}, title = {A Robust Damage Assessment Model for Corrupted Database Systems}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {237--251}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/GampaKS09, author = {Nagaraja Kaushik Gampa and Rohit Ashok Khot and Kannan Srinathan}, title = {Let Only the Right One {IN:} Privacy Management Scheme for Social Network}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {310--317}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/Govindaraju09, author = {Venu Govindaraju}, title = {Biometrics and Security}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {38}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/GuptaP09, author = {Gaurav Gupta and Josef Pieprzyk}, title = {Database Relation Watermarking Resilient against Secondary Watermarking Attacks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {222--236}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/Keromytis09, author = {Angelos D. Keromytis}, title = {A Survey of Voice over {IP} Security Research}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {1--17}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/LiangLMLD09, author = {Bing Liang and Yingjiu Li and Changshe Ma and Tieyan Li and Robert H. Deng}, title = {On the Untraceability of Anonymous {RFID} Authentication Protocol with Constant Key-Lookup}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {71--85}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/LiangV09, author = {Zhiyao Liang and Rakesh M. Verma}, title = {Correcting and Improving the {NP} Proof for Cryptographic Protocol Insecurity}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {101--116}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/Mancillas-LopezCR09, author = {Cuauhtemoc Mancillas{-}L{\'{o}}pez and Debrup Chakraborty and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {On Some Weaknesses in the Disk Encryption Schemes {EME} and {EME2}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {265--279}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/MartignoniPB09, author = {Lorenzo Martignoni and Roberto Paleari and Danilo Bruschi}, title = {A Framework for Behavior-Based Malware Analysis in the Cloud}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {178--192}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/MasiPT09, author = {Massimiliano Masi and Rosario Pugliese and Francesco Tiezzi}, title = {On Secure Implementation of an {IHE} XUA-Based Protocol for Authenticating Healthcare Professionals}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {55--70}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/MukkamalaKY09, author = {Ravi Mukkamala and Vishnu Kamisetty and Pawankumar Yedugani}, title = {Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper)}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {318--325}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/Nagaratnam09, author = {Nataraj Nagaratnam}, title = {Security for a Smarter Planet}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {18}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/OjhaKJL09, author = {Shrikant Ojha and Naveen Kumar and Kritika Jain and Sangeeta Lal}, title = {{TWIS} - {A} Lightweight Block Cipher}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {280--291}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/ReiterSSZ09, author = {Michael K. Reiter and Vyas Sekar and Chad Spensky and Zhenghao Zhang}, title = {Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {132--147}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/SahaM09, author = {Indranil Saha and Debapriyay Mukhopadhyay}, title = {Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {292--300}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/SmartR09, author = {Matt Smart and Eike Ritter}, title = {Remote Electronic Voting with Revocable Anonymity}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {39--54}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/WhiteP09, author = {Jonathan White and Brajendra Panda}, title = {Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {208--221}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/ZarnettLT09, author = {Jeff Zarnett and Patrick Lam and Mahesh V. Tripunitara}, title = {Method-Specific Java Access Control via {RMI} Proxy Objects Using Annotations}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {301--309}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/ZhangKKZCKL09, author = {Zhen Zhang and K. H. (Kane) Kim and Myeong{-}Ho Kang and Tianran Zhou and Byung{-}Ho Chung and Shin{-}Hyo Kim and Seok{-}Joon Lee}, title = {An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {148--162}, publisher = {Springer}, year = {2009} }
@proceedings{DBLP:conf/iciss/2009, editor = {Atul Prakash and Indranil Gupta}, title = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/iciss/Avancha08, author = {Sasikanth Avancha}, title = {A Framework for Trustworthy Service-Oriented Computing (Short Paper)}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {124--131}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/BaatarjavDP08, author = {Enkh{-}Amgalan Baatarjav and Ram Dantu and Santi Phithakkitnukoon}, title = {Privacy Management for Facebook}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {273--286}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/CuppensCT08, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Julien A. Thomas}, title = {A Robust Reputation Scheme for Decentralized Group Management Systems}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {71--85}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/DSouzaHKRS08, author = {Deepak D'Souza and Raveendra Holla and Janardhan Kulkarni and Raghavendra K. Ramesh and Barbara Sprick}, title = {On the Decidability of Model-Checking Information Flow Properties}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {26--40}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/DasM08, author = {Manik Lal Das and Ravi Mukkamala}, title = {Revisiting Bluetooth Security (Short Paper)}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {132--139}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/DusselGLR08, author = {Patrick D{\"{u}}ssel and Christian Gehl and Pavel Laskov and Konrad Rieck}, title = {Incorporation of Application Layer Protocol Syntax into Anomaly Detection}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {188--202}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/FalconeFM08, author = {Yli{\`{e}}s Falcone and Jean{-}Claude Fernandez and Laurent Mounier}, title = {Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {41--55}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/FoschiniTCKV08, author = {Luca Foschini and Ashish V. Thapliyal and Lorenzo Cavallaro and Christopher Kruegel and Giovanni Vigna}, title = {A Parallel Architecture for Stateful, High-Speed Intrusion Detection}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {203--220}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/FuchsP08, author = {Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {HyDRo - Hybrid Development of Roles}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {287--302}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/JayaramanPG08, author = {Umarani Jayaraman and Surya Prakash and Phalguni Gupta}, title = {Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {221--234}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/JinwalaPD08, author = {Devesh C. Jinwala and Dhiren R. Patel and Kankar S. Dasgupta}, title = {Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {258--272}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/KSD08, author = {Vivekananda Bhat K. and Indranil Sengupta and Abhijit Das}, title = {Audio Watermarking Based on Quantization in Wavelet Domain}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {235--242}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/KingHHJ08, author = {Dave King and Boniface Hicks and Michael Hicks and Trent Jaeger}, title = {Implicit Flows: Can't Live with 'Em, Can't Live without 'Em}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {56--70}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/LeBG08, author = {Duc{-}Phong Le and Alexis Bonnecaze and Alban Gabillon}, title = {A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper)}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {116--123}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/LiangV08, author = {Zhiyao Liang and Rakesh M. Verma}, title = {Complexity of Checking Freshness of Cryptographic Protocols}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {86--101}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/MondalS08, author = {Samrat Mondal and Shamik Sural}, title = {A Verification Framework for Temporal {RBAC} with Role Hierarchy (Short Paper)}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {140--147}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/Nitschke08, author = {Lukasz Nitschke}, title = {Secure Internet Voting Based on Paper Ballots}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {102--115}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/Rajan08, author = {Basant Rajan}, title = {The Enlightened Era of Enterprise Security (Invited Talk)}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {303--305}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/Sahai08, author = {Amit Sahai}, title = {Computing on Encrypted Data}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {148--153}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/SmithEJS08, author = {Randy Smith and Cristian Estan and Somesh Jha and Ida Sri Rejeki Siahaan}, title = {Fast Signature Matching Using Extended Finite Automaton {(XFA)}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {158--172}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/SongBYCJKLNPS08, author = {Dawn Xiaodong Song and David Brumley and Heng Yin and Juan Caballero and Ivan Jager and Min Gyung Kang and Zhenkai Liang and James Newsome and Pongsin Poosankam and Prateek Saxena}, title = {BitBlaze: {A} New Approach to Computer Security via Binary Analysis}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {1--25}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/SunithaA08, author = {N. R. Sunitha and B. B. Amberker}, title = {Proxy Re-signature Schemes}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {156--157}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/TedescoA08, author = {Gianni Tedesco and Uwe Aickelin}, title = {Real-Time Alert Correlation with Type Graphs}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {173--187}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/VermaMP08, author = {Neelam Verma and Prasanna R. Mishra and Gireesh Pandey}, title = {Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {154--155}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/WrightKS08, author = {Craig S. Wright and Dave Kleiman and Shyaam Sundhar R. S.}, title = {Overwriting Hard Drive Data: The Great Wiping Controversy}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {243--257}, publisher = {Springer}, year = {2008} }
@proceedings{DBLP:conf/iciss/2008, editor = {R. Sekar and Arun K. Pujari}, title = {Information Systems Security, 4th International Conference, {ICISS} 2008, Hyderabad, India, December 16-20, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5352}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/iciss/BapatBM07, author = {Dhananjay Bapat and Kevin R. B. Butler and Patrick D. McDaniel}, title = {Towards Automated Privilege Separation}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {272--276}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/BhattacharyaBBC07, author = {Debojyoti Bhattacharya and Nitin Bansal and Amitava Banerjee and Dipanwita Roy Chowdhury}, title = {A Near Optimal S-Box Design}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {77--90}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/BiskupBWW07, author = {Joachim Biskup and Dominique Marc Burgard and Torben Weibert and Lena Wiese}, title = {Inference Control in Logic Databases as a Constraint Satisfaction Problem}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {128--142}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/BobbaK07, author = {Rakeshbabu Bobba and Himanshu Khurana}, title = {{DLPKH} - Distributed Logical Public-Key Hierarchy}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {110--127}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/Clavier07, author = {Christophe Clavier}, title = {An Improved {SCARE} Cryptanalysis Against a Secret {A3/A8} {GSM} Algorithm}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {143--155}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/DashRP07, author = {Subrat Kumar Dash and Sanjay Rawat and Arun K. Pujari}, title = {Use of Dimensionality Reduction for Intrusion Detection}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {306--320}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/GiriS07, author = {Debasis Giri and Parmeshwary Dayal Srivastava}, title = {Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {156--166}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/GuptaSMSC07, author = {Gaurav Gupta and R. Sultania and Sounak Mondal and Sanjoy Kumar Saha and Bhabatosh Chanda}, title = {A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {250--253}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/KandikattuJ07, author = {Ramanarayana Kandikattu and Lillykutty Jacob}, title = {A Secure Intra-domain Routing Protocol for Wireless Mesh Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {37--50}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/KaurSMS07, author = {Navdeep Kaur and Rajwinder Singh and Manoj Misra and Anil Kumar Sarje}, title = {Secure Transaction Management Protocols for {MLS/DDBMS}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {219--233}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/LiDKQW07, author = {Jun Li and Dejing Dou and Shiwoong Kim and Han Qin and Yibo Wang}, title = {On Knowledge-Based Classification of Abnormal {BGP} Events}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {267--271}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/LimLM07, author = {Meng{-}Hui Lim and Sanggon Lee and Sang{-}Jae Moon}, title = {Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {64--76}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/ModiEK07, author = {Shimon K. Modi and Stephen J. Elliott and Hakil Kim}, title = {Performance Analysis for Multi Sensor Fingerprint Recognition System}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {292--305}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/PatraKT07, author = {G. K. Patra and V. Anil Kumar and R. P. Thangavelu}, title = {Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {193--207}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/PatraKT07a, author = {G. K. Patra and V. Anil Kumar and R. P. Thangavelu}, title = {A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {263--266}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/Prakash07, author = {Atul Prakash}, title = {Security in Practice - Security-Usability Chasm}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {1--9}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/RajaKNLPVP07, author = {K. B. Raja and Kiran Kumar K. and Satish Kumar N. and M. S. Lakshmi and H. Preeti and K. R. Venugopal and Lalit M. Patnaik}, title = {Genetic Algorithm Based Steganography Using Wavelets}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {51--63}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/RamamohanaraoGPL07, author = {Kotagiri Ramamohanarao and Kapil Kumar Gupta and Tao Peng and Christopher Leckie}, title = {The Curse of Ease of Access to the Internet}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {234--249}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/RayWMBHL07, author = {Daniel A. Ray and Charles B. Ward and Bogdan Munteanu and Jonathan Blackwell and Xiaoyan Hong and Jun Li}, title = {Investigating the Impact of Real-World Factors on Internet Worm Propagation}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {10--24}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/SardanaJ07, author = {Anjali Sardana and Ramesh Chandra Joshi}, title = {Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {259--262}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/SaxenaLJLS07, author = {Anshuman Saxena and Marc Lacoste and Tahar Jarboui and Ulf L{\"{u}}cking and Bernd Steinke}, title = {A Software Framework for Autonomic Security in Pervasive Environments}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {91--109}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/ShanWM07, author = {Zhiyong Shan and Qiuyue Wang and Xiaofeng Meng}, title = {An {OS} Security Protection Model for Defeating Attacks from Network}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {25--36}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/SharifiSVZ07, author = {Mohsen Sharifi and Alireza Saberi and Mojtaba Vahidi and Mohammad Zoroufi}, title = {A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {254--258}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/SinghC07, author = {Ashish Kumar Singh and Priya Chandran}, title = {A Secure and Efficient Multi-authority Proactive Election Scheme}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {208--218}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/SivakumarG07, author = {K. Sivakumar and K. Garg}, title = {Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration (CXE)" Using {CWE} and {CVE}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {277--291}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/Tanaka07, author = {Hidema Tanaka}, title = {Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {167--179}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/VimercatiS07, author = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Data Privacy - Problems and Solutions}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {180--192}, publisher = {Springer}, year = {2007} }
@proceedings{DBLP:conf/iciss/2007, editor = {Patrick D. McDaniel and Shyam K. Gupta}, title = {Information Systems Security, Third International Conference, {ICISS} 2007, Delhi, India, December 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4812}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iciss/BiskupP06, author = {Joachim Biskup and Joerg Parthe}, title = {Optimistic Anonymous Participation in Inter-organizational Workflow Instances}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {86--100}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/ButlerEPTM06, author = {Kevin R. B. Butler and William Enck and Jennifer Plasterr and Patrick Traynor and Patrick D. McDaniel}, title = {Privacy Preserving Web-Based Email}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {116--131}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/ChaithanyaSG06, author = {L. Chaithanya and M. P. Singh and M. M. Gore}, title = {Secure Data Management in Reactive Sensor Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {235--248}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/ClairJEPTMJ06, author = {Luke St. Clair and Lisa Johansen and William Enck and Matthew Pirretti and Patrick Traynor and Patrick D. McDaniel and Trent Jaeger}, title = {Password Exhaustion: Predicting the End of Password Usefulness}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {37--55}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/CuppensCC06, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and C{\'{e}}line Coma}, title = {{O2O:} Virtual Private Organizations to Manage Security Policy Interoperability}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {101--115}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/DamianiVFS06, author = {Ernesto Damiani and Sabrina De Capitani di Vimercati and Cristiano Fugazza and Pierangela Samarati}, title = {Extending Context Descriptions in Semantics-Aware Access Control}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {162--176}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/EkelhartFKW06, author = {Andreas Ekelhart and Stefan Fenz and Markus D. Klemen and Edgar R. Weippl}, title = {Security Ontology: Simulating Threats to Corporate Assets}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {249--259}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/Ghodosi06, author = {Hossein Ghodosi}, title = {An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {303--314}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/GuptaGG06, author = {Shyam K. Gupta and Vikram Goyal and Anand Gupta}, title = {Malafide Intension Based Detection of Privacy Violation in Information System}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {365--368}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/GuptaGPDG06, author = {Shyam K. Gupta and Vikram Goyal and Bholi Patra and Sankalp Dubey and Anand Gupta}, title = {Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report)}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {369--372}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/GurevichG06, author = {Alex Gurevich and Ehud Gudes}, title = {Recent Research on Privacy Preserving Data Mining}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {377--380}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/KaurSMS06, author = {Navdeep Kaur and Rajwinder Singh and Manoj Misra and Anil Kumar Sarje}, title = {Fairness Strategy for Multilevel Secure Concurrency Control Protocol}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {71--85}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/KumarS06, author = {N. V. Narendra Kumar and R. K. Shyamasundar}, title = {Specification and Realization of Access Control in {SPKI/SDSI}}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {177--193}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/KunduSM06, author = {Amlan Kundu and Shamik Sural and Arun K. Majumdar}, title = {Two-Stage Credit Card Fraud Detection Using Sequence Alignment}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {260--275}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/LeeR06, author = {Hyeran Lee and Kyung Hyune Rhee}, title = {High Capacity Lossless Data Hiding}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {326--336}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/LuLW06, author = {Haibing Lu and Yingjiu Li and Xintao Wu}, title = {Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract)}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {349--352}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/MajumdarTD06, author = {Anirban Majumdar and Clark D. Thomborson and Stephen Drape}, title = {A Survey of Control-Flow Obfuscations}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {353--356}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/MasoumzadehAJ06, author = {Amirreza Masoumzadeh and Morteza Amini and Rasool Jalili}, title = {Context-Aware Provisional Access Control}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {132--146}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/RaoMP06, author = {Y. V. Subba Rao and Abhijit Mitra and S. R. Mahadeva Prasanna}, title = {A Partial Image Encryption Method with Pseudo Random Sequences}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {315--325}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/RayKY06, author = {Indrakshi Ray and Mahendra Kumar and Lijun Yu}, title = {{LRBAC:} {A} Location-Aware Role-Based Access Control Model}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {147--161}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/ReddyDP06, author = {Krishna Sandeep Reddy Dubba and Subrat Kumar Dash and Arun K. Pujari}, title = {New Malicious Code Detection Using Variable Length \emph{n}-grams}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {276--288}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/SahaR06, author = {Mounita Saha and Dipanwita Roy Chowdhury}, title = {Design of Key Establishment Protocol Using One-Way Functions to Avert \emph{insider-replay} Attack}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {194--204}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/SaizMJBA06, author = {Purificaci{\'{o}}n S{\'{a}}iz and Jon Mat{\'{\i}}as and Eduardo Jacob and Javier Bustamante and Armando Astarloa}, title = {Adaptation of {IEEE} 802.1X for Secure Session Establishment Between Ethernet Peers}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {220--234}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/SenguptaB06, author = {Anirban Sengupta and Mridul Sankar Barik}, title = {Towards a Formal Specification Method for Enterprise Information System Security}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {373--376}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/ShanmugasundaramM06, author = {Kulesh Shanmugasundaram and Nasir D. Memon}, title = {Network Monitoring for Security and Forensics}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {56--70}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/SinghKS06, author = {Rajwinder Singh and Navdeep Kaur and Anil Kumar Sarje}, title = {Secure Itineraries Framework for Mobile Agent Systems}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {361--364}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/SinghLMVA06, author = {Vartika Singh and D. R. Lakshminarasimhaiah and Yogesh Mishra and Chitra Viswanathan and G. Athithan}, title = {An Implementation and Evaluation of Online Disk Encryption for Windows Systems}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {337--348}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/SwarupSR06, author = {Vipin Swarup and Len Seligman and Arnon Rosenthal}, title = {A Data Sharing Agreement Framework}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {22--36}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/VadnalaM06, author = {Praveen Kumar Vadnala and Anish Mathuria}, title = {An Efficient Key Assignment Scheme for Access Control in a Hierarchy}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {205--219}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/VimercatiS06, author = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Privacy in the Electronic Society}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {1--21}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/YuanGLLL06, author = {Weiwei Yuan and Donghai Guan and Sungyoung Lee and Young{-}Koo Lee and Heejo Lee}, title = {Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {357--360}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/ZangY06, author = {Wanyu Zang and Meng Yu}, title = {A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {289--302}, publisher = {Springer}, year = {2006} }
@proceedings{DBLP:conf/iciss/2006, editor = {Aditya Bagchi and Vijayalakshmi Atluri}, title = {Information Systems Security, Second International Conference, {ICISS} 2006, Kolkata, India, December 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4332}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/iciss/Bagchi-SenLRU05, author = {Sharmistha Bagchi{-}Sen and JinKyu Lee and H. Raghav Rao and Shambhu J. Upadhyaya}, title = {A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {317--321}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/BhattacharyaG05, author = {Jaijit Bhattacharya and S. K. Gupta}, title = {{EPAL} Based Privacy Enforcement Using {ECA} Rules}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {120--133}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/ButlerM05, author = {Kevin R. B. Butler and Patrick D. McDaniel}, title = {Understanding Mutable Internet Pathogens, or How {I} Learned to Stop Worrying and Love Parasitic Behavior}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {36--48}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/ChakrabartiMR05, author = {Dibyendu Chakrabarti and Subhamoy Maitra and Bimal K. Roy}, title = {A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {228--238}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/Chand05, author = {Prem Chand}, title = {Building India as the Destination for Secure Software Development - Next Wave of Opportunities for the {ICT} Industry}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {49--65}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/ChatterjeeSR05, author = {Roshni Chatterjee and Moiz A. Saifee and Dipanwita Roy Chowdhury}, title = {Modifications of {SHA-0} to Prevent Attacks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {277--289}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/ChristiansonCM05, author = {Bruce Christianson and Partha Das Chowdhury and James A. Malcolm}, title = {Auditable Anonymous Delegation}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {66--76}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/CuppensCS05, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Thierry Sans}, title = {Protection of Relationships in {XML} Documents with the {XML-BB} Model}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {148--163}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/DamianiAB05, author = {Ernesto Damiani and Marco Anisetti and Valerio Bellandi}, title = {Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {21--35}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/Das05, author = {Ashok Kumar Das}, title = {A Key Reshuffling Scheme for Wireless Sensor Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {205--216}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/DashRP05, author = {Subrat Kumar Dash and Krupa Sagar Reddy and Arun K. Pujari}, title = {Episode Based Masquerade Detection}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {251--262}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/HaZM05, author = {JungHoon Ha and Jianying Zhou and Sang{-}Jae Moon}, title = {A Robust Double Auction Protocol Based on a Hybrid Trust Model}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {77--90}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/MisraPB05, author = {Jaydev Mishra and Pinakpani Pal and Aditya Bagchi}, title = {{SPEAR:} Design of a Secured Peer-to-Peer Architecture}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {322--327}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/MukhopadhyayCNC05, author = {Debdeep Mukhopadhyay and Abhishek Chaudhary and Arvind Nebhnani and Dipanwita Roy Chowdhury}, title = {{CCMEA:} Customized Cellular Message Encryption Algorithm for Wireless Networks}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {217--227}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/OhLM05, author = {JoongHyo Oh and KyungKeun Lee and Sang{-}Jae Moon}, title = {How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {290--303}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/RadhaK05, author = {V. Radha and N. Hemanth Kumar}, title = {{EISA} - An Enterprise Application Security Solution for Databases}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {164--176}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/RamachandranN05, author = {Vivek Ramachandran and Sukumar Nandi}, title = {Detecting {ARP} Spoofing: An Active Technique}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {239--250}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/Ramkumar05, author = {Mahalingam Ramkumar}, title = {On Broadcast Encryption with Random Key Pre-distribution Schemes}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {304--316}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/RayCR05, author = {Indrajit Ray and Sudip Chakraborty and Indrakshi Ray}, title = {VTrust: {A} Trust Management System Based on a Vector Model of Trust}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {91--105}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/RayH05, author = {Indrakshi Ray and Wei Huang}, title = {Event Detection in Multilevel Secure Active Databases}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {177--190}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/SenguptaMRRABM05, author = {Anirban Sengupta and Aniruddha Mukhopadhyay and Koel Ray and Aveek Guha Roy and Dipankar Aich and Mridul Sankar Barik and Chandan Mazumdar}, title = {A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {328--331}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/SubramanianPBKGSVARP05, author = {N. Subramanian and Pramod S. Pawar and Mayank Bhatnagar and Nihar S. Khedekar and Srinivas Guntupalli and N. Satyanarayana and V. K. Vijaykumar and Praveen D. Ampatt and Rajiv Ranjan and Prasad J. Pandit}, title = {Development of a Comprehensive Intrusion Detection System - Challenges and Approaches}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {332--335}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/ThomasMEB05, author = {Shince Thomas and Devesh Misra and P. R. Lakshmi Eswari and N. Sarat Chandra Babu}, title = {A Transparent End-to-End Security Solution}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {336--339}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/Varadharajan05, author = {Vijay Varadharajan}, title = {Authorization and Trust Enhanced Security for Distributed Applications}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {1--20}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/VatsaSM05, author = {Vishal Vatsa and Shamik Sural and Arun K. Majumdar}, title = {A Game-Theoretic Approach to Credit Card Fraud Detection}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {263--276}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/WangHI05, author = {Jian Wang and Lein Harn and Hideki Imai}, title = {Key Management for Multicast Fingerprinting}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {191--204}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/WarnerAM05, author = {Janice Warner and Vijayalakshmi Atluri and Ravi Mukkamala}, title = {An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {134--147}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iciss/ZhaoVB05, author = {Weiliang Zhao and Vijay Varadharajan and George Bryan}, title = {Analysis and Modelling of Trust in Distributed Information Systems}, booktitle = {{ICISS}}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {106--119}, publisher = {Springer}, year = {2005} }
@proceedings{DBLP:conf/iciss/2005, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Information Systems Security, First International Conference, {ICISS} 2005, Kolkata, India, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3803}, publisher = {Springer}, year = {2005} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.