default search action
9th ICISS 2013: Kolkata, India
- Aditya Bagchi, Indrakshi Ray:
Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings. Lecture Notes in Computer Science 8303, Springer 2013, ISBN 978-3-642-45203-1 - Chris Clifton, Balamurugan Anandan:
Challenges and Opportunities for Security with Differential Privacy. 1-13 - Florian Kerschbaum, Martin Härterich, Mathias Kohler, Isabelle Hang, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
An Encrypted In-Memory Column-Store: The Onion Selection Problem. 14-26 - Kerim Yasin Oktay, Vaibhav Khadilkar, Murat Kantarcioglu, Sharad Mehrotra:
Risk Aware Approach to Data Confidentiality in Cloud Computing. 27-42 - Samiran Bag, Sushmita Ruj, Bimal K. Roy:
Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach. 43-62 - Ankita Chaturvedi, Dheerendra Mishra, Sourav Mukhopadhyay:
Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card. 63-77 - Angsuman Das, Avishek Adhikari:
Signcryption from Randomness Recoverable PKE Revisited. 78-90 - Sourya Joyee De, Asim K. Pal:
Auctions with Rational Adversary. 91-105 - Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens:
A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services. 106-120 - Ganugula Umadevi, Ashutosh Saxena:
Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach. 121-132 - Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri, Stephane Morucci:
Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management. 133-147 - Mathieu Jaume, Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong, Ludovic Mé:
Secure States versus Secure Executions - From Access Control to Flow Control. 148-162 - Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James:
Monitoring for Slow Suspicious Activities Using a Target Centric Approach. 163-168 - Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay, Goutam Paul:
RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers. 169-190 - Naveen Kumar, Anish Mathuria, Manik Lal Das:
Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme - (Short Paper). 191-198 - Sheethal Kumar, Pai B. J. Jaipal, Sourav Sen Gupta, Vigesh R. Ungrapalli:
Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing. 199-213 - David Lorenzi, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri:
Web Services Based Attacks against Image CAPTCHAs. 214-229 - Subhamoy Maitra, Sourav Sen Gupta:
New Long-Term Glimpse of RC4 Stream Cipher. 230-238 - Soumyadev Maity, Ramesh C. Hansdah:
A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs. 239-246 - Dheerendra Mishra, Sourav Mukhopadhyay:
Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols. 247-254 - Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:
Information Theoretical Analysis of Side-Channel Attack. 255-269 - Imon Mukherjee, Goutam Paul:
Efficient Multi-bit Image Steganography in Spatial Domain. 270-284 - Nabanita Mukherjee, Ayon Bhattacharya, Siddhartha Sekhar Bose:
Evolutionary Multibit Grouping Steganographic Algorithm. 285-296 - Beng Heng Ng, Atul Prakash:
Let the Right One in: Discovering and Mitigating Permission Gaps. 297-313 - R. V. Pradweap, R. C. Hansdah:
A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET. 314-328 - Y. Sreenivasa Rao, Ratna Dutta:
Recipient Anonymous Ciphertext-Policy Attribute Based Encryption. 329-344 - Santanu Sarkar, Sourav Sen Gupta, Subhamoy Maitra:
Error Correction of Partially Exposed RSA Private Keys from MSB Side. 345-359 - Anuj Shanker Saxena, Vikram Goyal, Debajyoti Bera:
Efficient Enforcement of Privacy for Moving Object Trajectories. 360-374 - Manisha Sharma, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
An Administrative Model for Spatio-Temporal Role Based Access Control. 375-389 - Yasser Sobhdel, Rasool Jalili:
A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm. 390-401
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.