


default search action
12th ICISS 2016: Jaipur, India
- Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti:

Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings. Lecture Notes in Computer Science 10063, Springer 2016, ISBN 978-3-319-49805-8
Attacks and Mitigation
- Kristof Teichel, Dieter Sibold, Stefan Milius:

An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms. 3-22 - Subhojeet Mukherjee, Hossein Shirazi

, Indrakshi Ray, Jeremy Daily, Rose F. Gamble:
Practical DoS Attacks on Embedded Networks in Commercial Vehicles. 23-42
Authentication
- Srinivas Jangirala

, Dheerendra Mishra
, Sourav Mukhopadhyay:
Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment. 45-65 - Ankit Maheshwari, Samrat Mondal

:
SPOSS: Secure Pin-Based-Authentication Obviating Shoulder Surfing. 66-86
Authorization and Information Flow Control
- Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia:

Building a Fair System Using Access Rights. 89-108 - Jerry den Hartog, Nicola Zannone

:
Collaborative Access Decisions: Why Has My Decision Not Been Enforced? 109-130 - Kyrre Wahl Kongsgård, Nils Agne Nordbotten, Federico Mancini, Paal E. Engelstad:

Data Loss Prevention Based on Text Classification in Controlled Environments. 131-150 - Angshuman Jana, Raju Halder

:
Defining Abstract Semantics for Static Dependence Analysis of Relational Database Applications. 151-171
Cryptosystem and Protocols
- Sébastien Canard, Viet Cuong Trinh

:
An Efficient Certificateless Signature Scheme in the Standard Model. 175-192 - Sébastien Canard, Viet Cuong Trinh

:
Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption. 193-211 - Maroti Deshmukh

, Neeta Nain
, Mushtaq Ahmed
:
Enhanced Modulo Based Multi Secret Image Sharing Scheme. 212-224 - S. J. Sheela

, K. V. Suresh
, Deepaknath Tandur:
Performance Evaluation of Modified Henon Map in Image Encryption. 225-240
Network Security and Intrusion Detection
- Hidema Tanaka:

Network Counter-Attack Strategy by Topology Map Analysis. 243-262 - Mridul Sankar Barik, Chandan Mazumdar, Amarnath Gupta:

Network Vulnerability Analysis Using a Constrained Graph Data Model. 263-282 - Surendra Singh, Sachin Tripathi

, Suvadip Batabyal
:
Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid. 283-300
Privacy
- Kissan G. Gauns Dessai, Venkatesh V. Kamat:

A Framework for Analyzing Associativity and Anonymity in Conventional and Electronic Summative Examinations. 303-323 - Hardik Gajera, Shruti Naik, Manik Lal Das:

On the Security of "Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems". 324-335 - Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar:

Privacy Preserving Network Analysis of Distributed Social Networks. 336-355
Software Security
- Sanat Ghoshal, Goutam Paul:

Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data. 359-371 - Varsharani Hawanna, Vrushali Y. Kulkarni

, Rashmi Rane
, Pooja Joshi:
Risk Evaluation of X.509 Certificates - A Machine Learning Application. 372-389
Wireless, Mobile and IoT Security
- Ashish Nanda

, Priyadarsi Nanda, Xiangjian He
, Aruna Jamdagni:
A Secure Routing Scheme for Wireless Mesh Networks. 393-408 - Venkata Udaya Sameer, S. Sugumaran, Ruchira Naskar

:
Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches. 409-425 - Douglas Simões Silva, Davi Resner, Rick Lopes de Souza, Jean Everson Martina

:
Formal Verification of a Cross-Layer, Trustful Space-Time Protocol for Wireless Sensor Networks. 426-443 - Sudhir Bagade, Vijay T. Raisinghani

:
JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET. 444-458
Short Papers
- Sharvari Prakash Chorghe, Narendra Shekokar

:
A Solution to Detect Phishing in Android Devices. 461-470 - T. Harsha, S. Asha, B. Soniya:

Feature Selection for Effective Botnet Detection Based on Periodicity of Traffic. 471-478 - Saurabh Chamotra

, Rakesh Kumar Sehgal, Sanjeev Ror
, Bhupendra Singh:
Honeypot Deployment in Broadband Networks. 479-488 - Jayaprakash Kar

, Kshirasagar Naik:
Generic Construction of Certificateless Signcryption Scheme. 489-498 - RatnaKumari Challa, VijayaKumari Gunta:

Reed-Muller Code Based Symmetric Key Fully Homomorphic Encryption Scheme. 499-508 - Ömer Yüksel, Jerry den Hartog, Sandro Etalle:

Towards Useful Anomaly Detection for Back Office Networks. 509-520 - Vineeta Jain

, Manoj Singh Gaur, Vijay Laxmi
, Mohamed Mosbah
:
Detection of SQLite Database Vulnerabilities in Android Apps. 521-531 - Lokesh Jain, Aditya Chandran, Sanjay Rawat

, Kannan Srinathan:
Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach. 532-542

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














