11. ICISS 2015: Kolkata, India

Invited Talks

Access Control

Attacks and Mitigation

Cloud Security

Crypto Systems and Protocols

Information Flow Control

Sensor Networks and Cognitive Radio

Watermarking and Steganography

Short Papers

maintained by Schloss Dagstuhl LZI at University of Trier