


default search action
10th ICISS 2014: Hyderabad, India
- Atul Prakash

, Rudrapatna K. Shyamasundar:
Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings. Lecture Notes in Computer Science 8880, Springer 2014, ISBN 978-3-319-13840-4
Invited Talks
- George Cybenko, Sushil Jajodia, Michael P. Wellman

, Peng Liu:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation. 1-8 - Victor Heorhiadi, Seyed Kaveh Fayaz, Michael K. Reiter, Vyas Sekar:

SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention Systems via Offloading. 9-29
Contributed Papers
- Joachim Biskup, Marcel Preuß:

Inference-Proof Data Publishing by Minimally Weakening a Database Instance. 30-49 - Ramaswamy Ramanujam, Vaishnavi Sundararajan, S. P. Suresh

:
Extending Dolev-Yao with Assertions. 50-68 - Koen Decroix, Denis Butin

, Joachim Jansen, Vincent Naessens:
Inferring Accountability from Trust Perceptions. 69-88 - Wilayat Khan, Stefano Calzavara

, Michele Bugliesi
, Willem De Groef, Frank Piessens:
Client Side Web Session Integrity as a Non-interference Property. 89-108 - Arindam Roy, Shamik Sural

, Arun Kumar Majumdar:
Impact of Multiple t-t SMER Constraints on Minimum User Requirement in RBAC. 109-128 - Sadhana Jha, Shamik Sural

, Jaideep Vaidya, Vijayalakshmi Atluri
:
Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies. 129-148 - Jaya Bhattacharjee, Anirban Sengupta

, Chandan Mazumdar:
A Formal Methodology for Modeling Threats to Enterprise Assets. 149-166 - Mukti Padhya, Devesh Jinwala

:
A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy. 167-184 - Goutam Paul, Pratik Sarkar, Sarbajit Mukherjee:

Towards a More Democratic Mining in Bitcoins. 185-203 - Peter Mayer

, Melanie Volkamer, Michaela Kauer:
Authentication Schemes - Comparison and Effective Password Spaces. 204-225 - Hiten Choudhury

, Basav Roychoudhury, Dilip Kr. Saikia:
A Security Extension Providing User Anonymity and Relaxed Trust Requirement in Non-3GPP Access to the EPS. 226-244 - Xiaolei Li, Xinshu Dong, Zhenkai Liang:

A Usage-Pattern Perspective for Privacy Ranking of Android Apps. 245-256 - Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Tushar Singhal, Mauro Conti

:
Privacy Leakage Attacks in Browsers by Colluding Extensions. 257-276 - Krishna Chaitanya Telikicherla, Venkatesh Choppella, Bruhadeshwar Bezawada:

CORP: A Browser Policy to Mitigate Web Infiltration Attacks. 277-297 - Nilesh Chakraborty, Samrat Mondal:

An Improved Methodology towards Providing Immunity against Weak Shoulder Surfing Attack. 298-317 - Tanmay Thakur, Rakesh M. Verma

:
Catching Classical and Hijack-Based Phishing Attacks. 318-337 - Paolo Rovelli, Ymir Vigfusson:

PMDS: Permission-Based Malware Detection System. 338-357 - Alexandre Vernotte, Frédéric Dadeau, Franck Lebeau, Bruno Legeard, Fabien Peureux, François Piat:

Efficient Detection of Multi-step Cross-Site Scripting Vulnerabilities. 358-377 - Richard Gay, Jinwei Hu, Heiko Mantel:

CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement. 378-398 - Aditya Basu

, Anish Mathuria, Nagendra Chowdary:
Automatic Generation of Compact Alphanumeric Shellcodes for x86. 399-410 - Biswajit Halder

, Rajkumar Darbar, Utpal Garain, Abhoy Chand Mondal:
Analysis of Fluorescent Paper Pulps for Detecting Counterfeit Indian Paper Money. 411-424 - Puneet Gupta, Phalguni Gupta:

A Vein Biometric Based Authentication System. 425-436 - Pankaj Malviya, Ruchira Naskar

:
Digital Forensic Technique for Double Compression Based JPEG Image Forgery Detection. 437-447 - Sumitra Biswal, Goutam Paul, Shashwat Raizada:

Preserving Privacy in Location-Based Services Using Sudoku Structures. 448-463 - Thong M. Doan, Han N. Dinh, Nam Tuan Nguyen, Phuoc T. Tran:

Location Obfuscation Framework for Training-Free Localization System. 464-476

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














