


default search action
8th ICISS 2012: Guwahati, India
- Venkat N. Venkatakrishnan, Diganta Goswami:

Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings. Lecture Notes in Computer Science 7671, Springer 2012, ISBN 978-3-642-35129-7
Invited Talk I
- Christopher Kruegel:

Fighting Malicious Software. 1-15
Technical Session I: Software Security
- Chaitrali Amrutkar, Kapil Singh, Arunabh Verma, Patrick Traynor:

VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security. 16-34 - Andres Ojamaa, Karl Düüna:

Security Assessment of Node.js Platform. 35-43
Invited Talk II
- Prasad Naldurg:

Foundations of Dynamic Access Control. 44-58
Technical Session II: Access Control
- Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:

Risk-Aware RBAC Sessions. 59-74 - Soumya Maity, Soumya Kanti Ghosh:

A Cognitive Trust Model for Access Control Framework in MANET. 75-88 - Khalifa Toumi, César Andrés, Ana R. Cavalli

:
Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments. 89-103
Invited Talk III
- Matthew L. Bolton, Celeste M. Wallace, Lenore D. Zuck:

On Policies and Intents. 104-118
Technical Session III: Covert Communications
- Arne Swinnen, Raoul Strackx, Pieter Philippaerts

, Frank Piessens:
ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel. 119-133 - Goutam Paul, Ian Davidson, Imon Mukherjee

, S. S. Ravi:
Keyless Steganography in Spatial Domain Using Energetic Pixels. 134-148 - Ruchira Naskar

, Rajat Subhra Chakraborty:
Fuzzy Inference Rule Based Reversible Watermarking for Digital Images. 149-163
Technical Session IV: Network Security I
- Vivek Natarajan, Yi Yang, Sencun Zhu:

Secure Trust Metadata Management for Mobile Ad-Hoc Networks. 164-180 - Rakesh Matam, Somanath Tripathy

:
Defence against Wormhole Attacks in Wireless Mesh Networks. 181-193 - Sarita Agrawal, Rodrigo Roman, Manik Lal Das, Anish Mathuria, Javier López

:
A Novel Key Update Protocol in Mobile Sensor Networks. 194-207 - Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roy Chowdhury, Aravind Iyer, Debojyoti Bhattacharya:

Autonomous Certification with List-Based Revocation for Secure V2V Communication. 208-222
Technical Session V: Database and Distributed Systems Security
- Weihan Li, Brajendra Panda, Qussai Yaseen

:
Mitigating Insider Threat on Database Integrity. 223-237 - Jaydeep Howlader, Jayanta Kar, Ashis Kumar Mal:

Coercion Resistant MIX for Electronic Auction. 238-248 - Girish Chandra, Divakar Yadav

:
Verification of Money Atomicity in Digital Cash Based Payment System. 249-264
Technical Session VI: Network Security II
- Alberto Peinado, Amparo Fúster-Sabater:

Cryptographic Analysis of a Type of Sequence Generators. 265-276 - Soumyadev Maity

, Ramesh C. Hansdah:
Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs. 277-293 - Y. Sreenivasa Rao

, Ratna Dutta:
Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks. 294-309
Technical Session VII
- Doaa Hassan:

Tracking Insecure Information Flows: A Prototype Evaluator in ASF+SDF. 310-326 - David Lorenzi, Jaideep Vaidya, Emre Uzun, Shamik Sural

, Vijayalakshmi Atluri
:
Attacking Image Based CAPTCHAs Using Image Recognition Techniques. 327-342 - Simin Ghasemi

, Morteza Noferesti, Mohammad Ali Hadavi, Sadegh Dorri Nogoorani
, Rasool Jalili:
Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach. 343-351

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














