


default search action
15th ICISS 2019: Hyderabad, India
- Deepak Garg

, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar
:
Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings. Lecture Notes in Computer Science 11952, Springer 2019, ISBN 978-3-030-36944-6
Smart Contracts
- Lucas M. Palma, Fernanda Oliveira Gomes, Martín A. Gagliotti Vigil, Jean Everson Martina:

A Transparent and Privacy-Aware Approach Using Smart Contracts for Car Insurance Reward Programs. 3-20 - Priyanka Pal, Sudharsana K. J. L., Rohith Balaji S.:

WiP: Criminal Smart Contract for Private Key Theft in End to End Encrypted Applications. 21-32
Formal Techniques
- Jonas Haglund, Roberto Guanciale:

Trustworthy Isolation of DMA Enabled Devices. 35-55
Access Control
- Aditya Dubey, Uttara Ravi, Somya Sharma, Barsha Mitra:

Toward Implementing Spatio-Temporal RBAC Extensions. 59-78 - Saptarshi Das

, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
, Gerhard Rigoll:
VisMAP: Visual Mining of Attribute-Based Access Control Policies. 79-98 - Gunjan Batra, Vijayalakshmi Atluri

, Jaideep Vaidya, Shamik Sural
:
Policy Reconciliation and Migration in Attribute Based Access Control. 99-120
Machine Learning
- Akhilesh Gangwar, Vadlamani Ravi

:
WiP: Generative Adversarial Network for Oversampling Data in Credit Card Fraud Detection. 123-134
Distributed Systems
- Anasuya Acharya, Manoj Prabhakaran, Akash Trehan:

An Introduction to the CellTree Paradigm (Invited Paper). 137-153 - Ali A. Noroozi, Khayyam Salehi

, Jaber Karimpour
, Ayaz Isazadeh:
Secure Information Flow Analysis Using the PRISM Model Checker. 154-172
Cryptography
- Felix Hörandner

, Sebastian Ramacher
, Simon Roth:
Selective End-To-End Data-Sharing in the Cloud. 175-195 - Felix Hörandner

, Franco Nieddu:
Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound Keys. 196-217 - Pranav Verma, Anish Mathuria, Sourish Dasgupta

:
Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirements. 218-238 - Deepak Kumar Dalai

, Santu Pal
:
Wip: Degree Evaluation of Grain-v1. 239-251
Online Social Networks
- Bintu Kadhiwala

, Sankita J. Patel:
A Novel k-Anonymization Approach to Prevent Insider Attack in Collaborative Social Network Data Publishing. 255-275
Images and Cryptography
- T. E. Jisha

, Thomas Monoth:
WiP: Security Enhanced Size Invariant Visual Cryptography with Perfect Reconstruction of White Pixels. 279-289 - Eram Fatima

, Saiful Islam
:
A New High Capacity and Reversible Data Hiding Technique for Images. 290-304
Miscellaneous Mix
- Arkaprava Bhaduri Mandal, Tanmoy Kanti Das:

Anti-forensics of a NAD-JPEG Detection Scheme Using Estimation of DC Coefficients. 307-323 - Ghanshyam S. Bopche

, Gopal N. Rai
, B. Ramachandra Reddy
, Babu M. Mehtre
:
Differential Attack Graph-Based Approach for Assessing Change in the Network Attack Surface. 324-344

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














