


default search action
10th ICISS 2014: Hyderabad, India
- Atul Prakash
, Rudrapatna K. Shyamasundar:
Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings. Lecture Notes in Computer Science 8880, Springer 2014, ISBN 978-3-319-13840-4
Invited Talks
- George Cybenko, Sushil Jajodia, Michael P. Wellman
, Peng Liu:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation. 1-8 - Victor Heorhiadi, Seyed Kaveh Fayaz, Michael K. Reiter, Vyas Sekar:
SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention Systems via Offloading. 9-29
Contributed Papers
- Joachim Biskup, Marcel Preuß:
Inference-Proof Data Publishing by Minimally Weakening a Database Instance. 30-49 - Ramaswamy Ramanujam, Vaishnavi Sundararajan, S. P. Suresh
:
Extending Dolev-Yao with Assertions. 50-68 - Koen Decroix, Denis Butin
, Joachim Jansen, Vincent Naessens:
Inferring Accountability from Trust Perceptions. 69-88 - Wilayat Khan, Stefano Calzavara
, Michele Bugliesi
, Willem De Groef, Frank Piessens:
Client Side Web Session Integrity as a Non-interference Property. 89-108 - Arindam Roy, Shamik Sural
, Arun Kumar Majumdar:
Impact of Multiple t-t SMER Constraints on Minimum User Requirement in RBAC. 109-128 - Sadhana Jha, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies. 129-148 - Jaya Bhattacharjee, Anirban Sengupta
, Chandan Mazumdar:
A Formal Methodology for Modeling Threats to Enterprise Assets. 149-166 - Mukti Padhya, Devesh Jinwala
:
A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy. 167-184 - Goutam Paul, Pratik Sarkar, Sarbajit Mukherjee:
Towards a More Democratic Mining in Bitcoins. 185-203 - Peter Mayer
, Melanie Volkamer, Michaela Kauer:
Authentication Schemes - Comparison and Effective Password Spaces. 204-225 - Hiten Choudhury
, Basav Roychoudhury, Dilip Kr. Saikia:
A Security Extension Providing User Anonymity and Relaxed Trust Requirement in Non-3GPP Access to the EPS. 226-244 - Xiaolei Li, Xinshu Dong, Zhenkai Liang:
A Usage-Pattern Perspective for Privacy Ranking of Android Apps. 245-256 - Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Tushar Singhal, Mauro Conti
:
Privacy Leakage Attacks in Browsers by Colluding Extensions. 257-276 - Krishna Chaitanya Telikicherla, Venkatesh Choppella, Bruhadeshwar Bezawada:
CORP: A Browser Policy to Mitigate Web Infiltration Attacks. 277-297 - Nilesh Chakraborty, Samrat Mondal:
An Improved Methodology towards Providing Immunity against Weak Shoulder Surfing Attack. 298-317 - Tanmay Thakur, Rakesh M. Verma
:
Catching Classical and Hijack-Based Phishing Attacks. 318-337 - Paolo Rovelli, Ymir Vigfusson:
PMDS: Permission-Based Malware Detection System. 338-357 - Alexandre Vernotte, Frédéric Dadeau, Franck Lebeau, Bruno Legeard, Fabien Peureux, François Piat:
Efficient Detection of Multi-step Cross-Site Scripting Vulnerabilities. 358-377 - Richard Gay, Jinwei Hu, Heiko Mantel:
CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement. 378-398 - Aditya Basu
, Anish Mathuria, Nagendra Chowdary:
Automatic Generation of Compact Alphanumeric Shellcodes for x86. 399-410 - Biswajit Halder
, Rajkumar Darbar, Utpal Garain, Abhoy Chand Mondal:
Analysis of Fluorescent Paper Pulps for Detecting Counterfeit Indian Paper Money. 411-424 - Puneet Gupta, Phalguni Gupta:
A Vein Biometric Based Authentication System. 425-436 - Pankaj Malviya, Ruchira Naskar
:
Digital Forensic Technique for Double Compression Based JPEG Image Forgery Detection. 437-447 - Sumitra Biswal, Goutam Paul, Shashwat Raizada:
Preserving Privacy in Location-Based Services Using Sudoku Structures. 448-463 - Thong M. Doan, Han N. Dinh, Nam Tuan Nguyen, Phuoc T. Tran:
Location Obfuscation Framework for Training-Free Localization System. 464-476

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.