default search action
5th ICISS 2009: Kolkata, India
- Atul Prakash, Indranil Gupta:
Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings. Lecture Notes in Computer Science 5905, Springer 2009, ISBN 978-3-642-10771-9 - Angelos D. Keromytis:
A Survey of Voice over IP Security Research. 1-17 - Nataraj Nagaratnam:
Security for a Smarter Planet. 18 - Marc Dacier, Van-Hau Pham, Olivier Thonnard:
The WOMBAT Attack Attribution Method: Some Results. 19-37 - Venu Govindaraju:
Biometrics and Security. 38 - Matt Smart, Eike Ritter:
Remote Electronic Voting with Revocable Anonymity. 39-54 - Massimiliano Masi, Rosario Pugliese, Francesco Tiezzi:
On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals. 55-70 - Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert H. Deng:
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. 71-85 - Michael Adjedj, Julien Bringer, Hervé Chabanne, Bruno Kindarji:
Biometric Identification over Encrypted Data Made Feasible. 86-100 - Zhiyao Liang, Rakesh M. Verma:
Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity. 101-116 - Padmalochan Bera, Soumya Kanti Ghosh, Pallab Dasgupta:
Formal Verification of Security Policy Implementations in Enterprise Networks. 117-131 - Michael K. Reiter, Vyas Sekar, Chad Spensky, Zhenghao Zhang:
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles. 132-147 - Zhen Zhang, K. H. (Kane) Kim, Myeong-Ho Kang, Tianran Zhou, Byung-Ho Chung, Shin-Hyo Kim, Seok-Joon Lee:
An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products. 148-162 - Ping Chen, Hai Xiao, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie:
DROP: Detecting Return-Oriented Programming Malicious Code. 163-177 - Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi:
A Framework for Behavior-Based Malware Analysis in the Cloud. 178-192 - Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis:
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. 193-207 - Jonathan White, Brajendra Panda:
Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders. 208-221 - Gaurav Gupta, Josef Pieprzyk:
Database Relation Watermarking Resilient against Secondary Watermarking Attacks. 222-236 - Ge Fu, Hong Zhu, Yingjiu Li:
A Robust Damage Assessment Model for Corrupted Database Systems. 237-251 - Sukriti Bhattacharya, Agostino Cortesi:
A Generic Distortion Free Watermarking Technique for Relational Databases. 252-264 - Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez:
On Some Weaknesses in the Disk Encryption Schemes EME and EME2. 265-279 - Shrikant Ojha, Naveen Kumar, Kritika Jain, Sangeeta Lal:
TWIS - A Lightweight Block Cipher. 280-291 - Indranil Saha, Debapriyay Mukhopadhyay:
Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking. 292-300 - Jeff Zarnett, Patrick Lam, Mahesh V. Tripunitara:
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations. 301-309 - Nagaraja Kaushik Gampa, Rohit Ashok Khot, Kannan Srinathan:
Let Only the Right One IN: Privacy Management Scheme for Social Network. 310-317 - Ravi Mukkamala, Vishnu Kamisetty, Pawankumar Yedugani:
Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper). 318-325
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.