Search dblp for Publications

export results for "toc:db/conf/iciss/iciss2009.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iciss/AdjedjBCK09,
  author       = {Michael Adjedj and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Bruno Kindarji},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Biometric Identification over Encrypted Data Made Feasible},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {86--100},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_8},
  doi          = {10.1007/978-3-642-10772-6\_8},
  timestamp    = {Wed, 12 May 2021 16:44:21 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/AdjedjBCK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BeraGD09,
  author       = {Padmalochan Bera and
                  Soumya Kanti Ghosh and
                  Pallab Dasgupta},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Formal Verification of Security Policy Implementations in Enterprise
                  Networks},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {117--131},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_10},
  doi          = {10.1007/978-3-642-10772-6\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/BeraGD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BhattacharyaC09,
  author       = {Sukriti Bhattacharya and
                  Agostino Cortesi},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {A Generic Distortion Free Watermarking Technique for Relational Databases},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {252--264},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_19},
  doi          = {10.1007/978-3-642-10772-6\_19},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/BhattacharyaC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChenXSYMX09,
  author       = {Ping Chen and
                  Hai Xiao and
                  Xiaobin Shen and
                  Xinchun Yin and
                  Bing Mao and
                  Li Xie},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {{DROP:} Detecting Return-Oriented Programming Malicious Code},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {163--177},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_13},
  doi          = {10.1007/978-3-642-10772-6\_13},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/ChenXSYMX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DacierPT09,
  author       = {Marc Dacier and
                  Van{-}Hau Pham and
                  Olivier Thonnard},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {The {WOMBAT} Attack Attribution Method: Some Results},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {19--37},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_3},
  doi          = {10.1007/978-3-642-10772-6\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/DacierPT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Frias-MartinezSK09,
  author       = {Vanessa Fr{\'{\i}}as{-}Mart{\'{\i}}nez and
                  Salvatore J. Stolfo and
                  Angelos D. Keromytis},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {{BARTER:} Behavior Profile Exchange for Behavior-Based Admission and
                  Access Control in MANETs},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {193--207},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_15},
  doi          = {10.1007/978-3-642-10772-6\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/Frias-MartinezSK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/FuZL09,
  author       = {Ge Fu and
                  Hong Zhu and
                  Yingjiu Li},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {A Robust Damage Assessment Model for Corrupted Database Systems},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {237--251},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_18},
  doi          = {10.1007/978-3-642-10772-6\_18},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/FuZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GampaKS09,
  author       = {Nagaraja Kaushik Gampa and
                  Rohit Ashok Khot and
                  Kannan Srinathan},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Let Only the Right One {IN:} Privacy Management Scheme for Social
                  Network},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {310--317},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_24},
  doi          = {10.1007/978-3-642-10772-6\_24},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/GampaKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Govindaraju09,
  author       = {Venu Govindaraju},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Biometrics and Security},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {38},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_4},
  doi          = {10.1007/978-3-642-10772-6\_4},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/Govindaraju09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GuptaP09,
  author       = {Gaurav Gupta and
                  Josef Pieprzyk},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Database Relation Watermarking Resilient against Secondary Watermarking
                  Attacks},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {222--236},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_17},
  doi          = {10.1007/978-3-642-10772-6\_17},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/GuptaP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Keromytis09,
  author       = {Angelos D. Keromytis},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {A Survey of Voice over {IP} Security Research},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_1},
  doi          = {10.1007/978-3-642-10772-6\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/Keromytis09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LiangLMLD09,
  author       = {Bing Liang and
                  Yingjiu Li and
                  Changshe Ma and
                  Tieyan Li and
                  Robert H. Deng},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {On the Untraceability of Anonymous {RFID} Authentication Protocol
                  with Constant Key-Lookup},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {71--85},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_7},
  doi          = {10.1007/978-3-642-10772-6\_7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/LiangLMLD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LiangV09,
  author       = {Zhiyao Liang and
                  Rakesh M. Verma},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Correcting and Improving the {NP} Proof for Cryptographic Protocol
                  Insecurity},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {101--116},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_9},
  doi          = {10.1007/978-3-642-10772-6\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/LiangV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Mancillas-LopezCR09,
  author       = {Cuauhtemoc Mancillas{-}L{\'{o}}pez and
                  Debrup Chakraborty and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {On Some Weaknesses in the Disk Encryption Schemes {EME} and {EME2}},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {265--279},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_20},
  doi          = {10.1007/978-3-642-10772-6\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/Mancillas-LopezCR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MartignoniPB09,
  author       = {Lorenzo Martignoni and
                  Roberto Paleari and
                  Danilo Bruschi},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {A Framework for Behavior-Based Malware Analysis in the Cloud},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {178--192},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_14},
  doi          = {10.1007/978-3-642-10772-6\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/MartignoniPB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MasiPT09,
  author       = {Massimiliano Masi and
                  Rosario Pugliese and
                  Francesco Tiezzi},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {On Secure Implementation of an {IHE} XUA-Based Protocol for Authenticating
                  Healthcare Professionals},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {55--70},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_6},
  doi          = {10.1007/978-3-642-10772-6\_6},
  timestamp    = {Thu, 20 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/MasiPT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MukkamalaKY09,
  author       = {Ravi Mukkamala and
                  Vishnu Kamisetty and
                  Pawankumar Yedugani},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Detecting and Resolving Misconfigurations in Role-Based Access Control
                  (Short Paper)},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {318--325},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_25},
  doi          = {10.1007/978-3-642-10772-6\_25},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/MukkamalaKY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Nagaratnam09,
  author       = {Nataraj Nagaratnam},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Security for a Smarter Planet},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {18},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_2},
  doi          = {10.1007/978-3-642-10772-6\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/Nagaratnam09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/OjhaKJL09,
  author       = {Shrikant Ojha and
                  Naveen Kumar and
                  Kritika Jain and
                  Sangeeta Lal},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {{TWIS} - {A} Lightweight Block Cipher},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {280--291},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_21},
  doi          = {10.1007/978-3-642-10772-6\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/OjhaKJL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ReiterSSZ09,
  author       = {Michael K. Reiter and
                  Vyas Sekar and
                  Chad Spensky and
                  Zhenghao Zhang},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Making Peer-Assisted Content Distribution Robust to Collusion Using
                  Bandwidth Puzzles},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {132--147},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_11},
  doi          = {10.1007/978-3-642-10772-6\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/ReiterSSZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SahaM09,
  author       = {Indranil Saha and
                  Debapriyay Mukhopadhyay},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Quantitative Analysis of a Probabilistic Non-repudiation Protocol
                  through Model Checking},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {292--300},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_22},
  doi          = {10.1007/978-3-642-10772-6\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/SahaM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SmartR09,
  author       = {Matt Smart and
                  Eike Ritter},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Remote Electronic Voting with Revocable Anonymity},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {39--54},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_5},
  doi          = {10.1007/978-3-642-10772-6\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/SmartR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/WhiteP09,
  author       = {Jonathan White and
                  Brajendra Panda},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Automatic Identification of Critical Data Items in a Database to Mitigate
                  the Effects of Malicious Insiders},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {208--221},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_16},
  doi          = {10.1007/978-3-642-10772-6\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/WhiteP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ZarnettLT09,
  author       = {Jeff Zarnett and
                  Patrick Lam and
                  Mahesh V. Tripunitara},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Method-Specific Java Access Control via {RMI} Proxy Objects Using
                  Annotations},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {301--309},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_23},
  doi          = {10.1007/978-3-642-10772-6\_23},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/ZarnettLT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ZhangKKZCKL09,
  author       = {Zhen Zhang and
                  K. H. (Kane) Kim and
                  Myeong{-}Ho Kang and
                  Tianran Zhou and
                  Byung{-}Ho Chung and
                  Shin{-}Hyo Kim and
                  Seok{-}Joon Lee},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing
                  of Information Products},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {148--162},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_12},
  doi          = {10.1007/978-3-642-10772-6\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/ZhangKKZCKL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2009,
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6},
  doi          = {10.1007/978-3-642-10772-6},
  isbn         = {978-3-642-10771-9},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics