


default search action
8th ICISS 2012: Guwahati, India
- Venkat N. Venkatakrishnan, Diganta Goswami:
Information Systems Security, 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings. Lecture Notes in Computer Science 7671, Springer 2012, ISBN 978-3-642-35129-7
Invited Talk I
- Christopher Kruegel:
Fighting Malicious Software. 1-15
Technical Session I: Software Security
- Chaitrali Amrutkar, Kapil Singh, Arunabh Verma, Patrick Traynor:
VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security. 16-34 - Andres Ojamaa, Karl Düüna:
Security Assessment of Node.js Platform. 35-43
Invited Talk II
- Prasad Naldurg:
Foundations of Dynamic Access Control. 44-58
Technical Session II: Access Control
- Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:
Risk-Aware RBAC Sessions. 59-74 - Soumya Maity, Soumya Kanti Ghosh:
A Cognitive Trust Model for Access Control Framework in MANET. 75-88 - Khalifa Toumi, César Andrés, Ana R. Cavalli
:
Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments. 89-103
Invited Talk III
- Matthew L. Bolton, Celeste M. Wallace, Lenore D. Zuck:
On Policies and Intents. 104-118
Technical Session III: Covert Communications
- Arne Swinnen, Raoul Strackx, Pieter Philippaerts
, Frank Piessens:
ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel. 119-133 - Goutam Paul, Ian Davidson, Imon Mukherjee
, S. S. Ravi:
Keyless Steganography in Spatial Domain Using Energetic Pixels. 134-148 - Ruchira Naskar
, Rajat Subhra Chakraborty:
Fuzzy Inference Rule Based Reversible Watermarking for Digital Images. 149-163
Technical Session IV: Network Security I
- Vivek Natarajan, Yi Yang, Sencun Zhu:
Secure Trust Metadata Management for Mobile Ad-Hoc Networks. 164-180 - Rakesh Matam, Somanath Tripathy
:
Defence against Wormhole Attacks in Wireless Mesh Networks. 181-193 - Sarita Agrawal, Rodrigo Roman, Manik Lal Das, Anish Mathuria, Javier López
:
A Novel Key Update Protocol in Mobile Sensor Networks. 194-207 - Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roy Chowdhury, Aravind Iyer, Debojyoti Bhattacharya:
Autonomous Certification with List-Based Revocation for Secure V2V Communication. 208-222
Technical Session V: Database and Distributed Systems Security
- Weihan Li, Brajendra Panda, Qussai Yaseen
:
Mitigating Insider Threat on Database Integrity. 223-237 - Jaydeep Howlader, Jayanta Kar, Ashis Kumar Mal:
Coercion Resistant MIX for Electronic Auction. 238-248 - Girish Chandra, Divakar Yadav
:
Verification of Money Atomicity in Digital Cash Based Payment System. 249-264
Technical Session VI: Network Security II
- Alberto Peinado, Amparo Fúster-Sabater:
Cryptographic Analysis of a Type of Sequence Generators. 265-276 - Soumyadev Maity
, Ramesh C. Hansdah:
Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs. 277-293 - Y. Sreenivasa Rao
, Ratna Dutta:
Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks. 294-309
Technical Session VII
- Doaa Hassan:
Tracking Insecure Information Flows: A Prototype Evaluator in ASF+SDF. 310-326 - David Lorenzi, Jaideep Vaidya, Emre Uzun, Shamik Sural
, Vijayalakshmi Atluri
:
Attacking Image Based CAPTCHAs Using Image Recognition Techniques. 327-342 - Simin Ghasemi
, Morteza Noferesti, Mohammad Ali Hadavi, Sadegh Dorri Nogoorani
, Rasool Jalili:
Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach. 343-351

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.