Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/iciss/iciss2009.bht:"
@inproceedings{DBLP:conf/iciss/AdjedjBCK09, author = {Michael Adjedj and Julien Bringer and Herv{\'{e}} Chabanne and Bruno Kindarji}, editor = {Atul Prakash and Indranil Gupta}, title = {Biometric Identification over Encrypted Data Made Feasible}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {86--100}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_8}, doi = {10.1007/978-3-642-10772-6\_8}, timestamp = {Wed, 12 May 2021 16:44:21 +0200}, biburl = {https://dblp.org/rec/conf/iciss/AdjedjBCK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/BeraGD09, author = {Padmalochan Bera and Soumya Kanti Ghosh and Pallab Dasgupta}, editor = {Atul Prakash and Indranil Gupta}, title = {Formal Verification of Security Policy Implementations in Enterprise Networks}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {117--131}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_10}, doi = {10.1007/978-3-642-10772-6\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/BeraGD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/BhattacharyaC09, author = {Sukriti Bhattacharya and Agostino Cortesi}, editor = {Atul Prakash and Indranil Gupta}, title = {A Generic Distortion Free Watermarking Technique for Relational Databases}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {252--264}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_19}, doi = {10.1007/978-3-642-10772-6\_19}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/BhattacharyaC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/ChenXSYMX09, author = {Ping Chen and Hai Xiao and Xiaobin Shen and Xinchun Yin and Bing Mao and Li Xie}, editor = {Atul Prakash and Indranil Gupta}, title = {{DROP:} Detecting Return-Oriented Programming Malicious Code}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {163--177}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_13}, doi = {10.1007/978-3-642-10772-6\_13}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/ChenXSYMX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/DacierPT09, author = {Marc Dacier and Van{-}Hau Pham and Olivier Thonnard}, editor = {Atul Prakash and Indranil Gupta}, title = {The {WOMBAT} Attack Attribution Method: Some Results}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {19--37}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_3}, doi = {10.1007/978-3-642-10772-6\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/DacierPT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/Frias-MartinezSK09, author = {Vanessa Fr{\'{\i}}as{-}Mart{\'{\i}}nez and Salvatore J. Stolfo and Angelos D. Keromytis}, editor = {Atul Prakash and Indranil Gupta}, title = {{BARTER:} Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {193--207}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_15}, doi = {10.1007/978-3-642-10772-6\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/Frias-MartinezSK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/FuZL09, author = {Ge Fu and Hong Zhu and Yingjiu Li}, editor = {Atul Prakash and Indranil Gupta}, title = {A Robust Damage Assessment Model for Corrupted Database Systems}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {237--251}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_18}, doi = {10.1007/978-3-642-10772-6\_18}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/FuZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/GampaKS09, author = {Nagaraja Kaushik Gampa and Rohit Ashok Khot and Kannan Srinathan}, editor = {Atul Prakash and Indranil Gupta}, title = {Let Only the Right One {IN:} Privacy Management Scheme for Social Network}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {310--317}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_24}, doi = {10.1007/978-3-642-10772-6\_24}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/GampaKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/Govindaraju09, author = {Venu Govindaraju}, editor = {Atul Prakash and Indranil Gupta}, title = {Biometrics and Security}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {38}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_4}, doi = {10.1007/978-3-642-10772-6\_4}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/Govindaraju09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/GuptaP09, author = {Gaurav Gupta and Josef Pieprzyk}, editor = {Atul Prakash and Indranil Gupta}, title = {Database Relation Watermarking Resilient against Secondary Watermarking Attacks}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {222--236}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_17}, doi = {10.1007/978-3-642-10772-6\_17}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/GuptaP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/Keromytis09, author = {Angelos D. Keromytis}, editor = {Atul Prakash and Indranil Gupta}, title = {A Survey of Voice over {IP} Security Research}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {1--17}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_1}, doi = {10.1007/978-3-642-10772-6\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/Keromytis09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/LiangLMLD09, author = {Bing Liang and Yingjiu Li and Changshe Ma and Tieyan Li and Robert H. Deng}, editor = {Atul Prakash and Indranil Gupta}, title = {On the Untraceability of Anonymous {RFID} Authentication Protocol with Constant Key-Lookup}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {71--85}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_7}, doi = {10.1007/978-3-642-10772-6\_7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/LiangLMLD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/LiangV09, author = {Zhiyao Liang and Rakesh M. Verma}, editor = {Atul Prakash and Indranil Gupta}, title = {Correcting and Improving the {NP} Proof for Cryptographic Protocol Insecurity}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {101--116}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_9}, doi = {10.1007/978-3-642-10772-6\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/LiangV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/Mancillas-LopezCR09, author = {Cuauhtemoc Mancillas{-}L{\'{o}}pez and Debrup Chakraborty and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, editor = {Atul Prakash and Indranil Gupta}, title = {On Some Weaknesses in the Disk Encryption Schemes {EME} and {EME2}}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {265--279}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_20}, doi = {10.1007/978-3-642-10772-6\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/Mancillas-LopezCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/MartignoniPB09, author = {Lorenzo Martignoni and Roberto Paleari and Danilo Bruschi}, editor = {Atul Prakash and Indranil Gupta}, title = {A Framework for Behavior-Based Malware Analysis in the Cloud}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {178--192}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_14}, doi = {10.1007/978-3-642-10772-6\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/MartignoniPB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/MasiPT09, author = {Massimiliano Masi and Rosario Pugliese and Francesco Tiezzi}, editor = {Atul Prakash and Indranil Gupta}, title = {On Secure Implementation of an {IHE} XUA-Based Protocol for Authenticating Healthcare Professionals}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {55--70}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_6}, doi = {10.1007/978-3-642-10772-6\_6}, timestamp = {Thu, 20 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/MasiPT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/MukkamalaKY09, author = {Ravi Mukkamala and Vishnu Kamisetty and Pawankumar Yedugani}, editor = {Atul Prakash and Indranil Gupta}, title = {Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper)}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {318--325}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_25}, doi = {10.1007/978-3-642-10772-6\_25}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/MukkamalaKY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/Nagaratnam09, author = {Nataraj Nagaratnam}, editor = {Atul Prakash and Indranil Gupta}, title = {Security for a Smarter Planet}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {18}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_2}, doi = {10.1007/978-3-642-10772-6\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/Nagaratnam09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/OjhaKJL09, author = {Shrikant Ojha and Naveen Kumar and Kritika Jain and Sangeeta Lal}, editor = {Atul Prakash and Indranil Gupta}, title = {{TWIS} - {A} Lightweight Block Cipher}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {280--291}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_21}, doi = {10.1007/978-3-642-10772-6\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/OjhaKJL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/ReiterSSZ09, author = {Michael K. Reiter and Vyas Sekar and Chad Spensky and Zhenghao Zhang}, editor = {Atul Prakash and Indranil Gupta}, title = {Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {132--147}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_11}, doi = {10.1007/978-3-642-10772-6\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/ReiterSSZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SahaM09, author = {Indranil Saha and Debapriyay Mukhopadhyay}, editor = {Atul Prakash and Indranil Gupta}, title = {Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {292--300}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_22}, doi = {10.1007/978-3-642-10772-6\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/SahaM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SmartR09, author = {Matt Smart and Eike Ritter}, editor = {Atul Prakash and Indranil Gupta}, title = {Remote Electronic Voting with Revocable Anonymity}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {39--54}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_5}, doi = {10.1007/978-3-642-10772-6\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/SmartR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/WhiteP09, author = {Jonathan White and Brajendra Panda}, editor = {Atul Prakash and Indranil Gupta}, title = {Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {208--221}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_16}, doi = {10.1007/978-3-642-10772-6\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/WhiteP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/ZarnettLT09, author = {Jeff Zarnett and Patrick Lam and Mahesh V. Tripunitara}, editor = {Atul Prakash and Indranil Gupta}, title = {Method-Specific Java Access Control via {RMI} Proxy Objects Using Annotations}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {301--309}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_23}, doi = {10.1007/978-3-642-10772-6\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/ZarnettLT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/ZhangKKZCKL09, author = {Zhen Zhang and K. H. (Kane) Kim and Myeong{-}Ho Kang and Tianran Zhou and Byung{-}Ho Chung and Shin{-}Hyo Kim and Seok{-}Joon Lee}, editor = {Atul Prakash and Indranil Gupta}, title = {An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {148--162}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_12}, doi = {10.1007/978-3-642-10772-6\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/ZhangKKZCKL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iciss/2009, editor = {Atul Prakash and Indranil Gupta}, title = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6}, doi = {10.1007/978-3-642-10772-6}, isbn = {978-3-642-10771-9}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.