


default search action
5th ICISS 2009: Kolkata, India
- Atul Prakash

, Indranil Gupta:
Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings. Lecture Notes in Computer Science 5905, Springer 2009, ISBN 978-3-642-10771-9 - Angelos D. Keromytis:

A Survey of Voice over IP Security Research. 1-17 - Nataraj Nagaratnam:

Security for a Smarter Planet. 18 - Marc Dacier

, Van-Hau Pham, Olivier Thonnard:
The WOMBAT Attack Attribution Method: Some Results. 19-37 - Venu Govindaraju

:
Biometrics and Security. 38 - Matt Smart, Eike Ritter:

Remote Electronic Voting with Revocable Anonymity. 39-54 - Massimiliano Masi

, Rosario Pugliese
, Francesco Tiezzi:
On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals. 55-70 - Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert H. Deng

:
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. 71-85 - Michael Adjedj, Julien Bringer, Hervé Chabanne, Bruno Kindarji:

Biometric Identification over Encrypted Data Made Feasible. 86-100 - Zhiyao Liang, Rakesh M. Verma

:
Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity. 101-116 - Padmalochan Bera, Soumya Kanti Ghosh, Pallab Dasgupta:

Formal Verification of Security Policy Implementations in Enterprise Networks. 117-131 - Michael K. Reiter, Vyas Sekar, Chad Spensky, Zhenghao Zhang:

Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles. 132-147 - Zhen Zhang, K. H. (Kane) Kim, Myeong-Ho Kang, Tianran Zhou, Byung-Ho Chung, Shin-Hyo Kim, Seok-Joon Lee:

An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products. 148-162 - Ping Chen, Hai Xiao, Xiaobin Shen

, Xinchun Yin, Bing Mao, Li Xie:
DROP: Detecting Return-Oriented Programming Malicious Code. 163-177 - Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi:

A Framework for Behavior-Based Malware Analysis in the Cloud. 178-192 - Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis:

BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. 193-207 - Jonathan White, Brajendra Panda:

Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders. 208-221 - Gaurav Gupta

, Josef Pieprzyk
:
Database Relation Watermarking Resilient against Secondary Watermarking Attacks. 222-236 - Ge Fu, Hong Zhu, Yingjiu Li:

A Robust Damage Assessment Model for Corrupted Database Systems. 237-251 - Sukriti Bhattacharya, Agostino Cortesi

:
A Generic Distortion Free Watermarking Technique for Relational Databases. 252-264 - Cuauhtemoc Mancillas-López

, Debrup Chakraborty
, Francisco Rodríguez-Henríquez:
On Some Weaknesses in the Disk Encryption Schemes EME and EME2. 265-279 - Shrikant Ojha, Naveen Kumar

, Kritika Jain, Sangeeta Lal:
TWIS - A Lightweight Block Cipher. 280-291 - Indranil Saha, Debapriyay Mukhopadhyay:

Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking. 292-300 - Jeff Zarnett, Patrick Lam, Mahesh V. Tripunitara:

Method-Specific Java Access Control via RMI Proxy Objects Using Annotations. 301-309 - Nagaraja Kaushik Gampa, Rohit Ashok Khot

, Kannan Srinathan:
Let Only the Right One IN: Privacy Management Scheme for Social Network. 310-317 - Ravi Mukkamala, Vishnu Kamisetty, Pawankumar Yedugani:

Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper). 318-325

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














