default search action
12th ICISS 2016: Jaipur, India
- Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti:
Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings. Lecture Notes in Computer Science 10063, Springer 2016, ISBN 978-3-319-49805-8
Attacks and Mitigation
- Kristof Teichel, Dieter Sibold, Stefan Milius:
An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms. 3-22 - Subhojeet Mukherjee, Hossein Shirazi, Indrakshi Ray, Jeremy Daily, Rose F. Gamble:
Practical DoS Attacks on Embedded Networks in Commercial Vehicles. 23-42
Authentication
- Srinivas Jangirala, Dheerendra Mishra, Sourav Mukhopadhyay:
Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment. 45-65 - Ankit Maheshwari, Samrat Mondal:
SPOSS: Secure Pin-Based-Authentication Obviating Shoulder Surfing. 66-86
Authorization and Information Flow Control
- Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia:
Building a Fair System Using Access Rights. 89-108 - Jerry den Hartog, Nicola Zannone:
Collaborative Access Decisions: Why Has My Decision Not Been Enforced? 109-130 - Kyrre Wahl Kongsgård, Nils Agne Nordbotten, Federico Mancini, Paal E. Engelstad:
Data Loss Prevention Based on Text Classification in Controlled Environments. 131-150 - Angshuman Jana, Raju Halder:
Defining Abstract Semantics for Static Dependence Analysis of Relational Database Applications. 151-171
Cryptosystem and Protocols
- Sébastien Canard, Viet Cuong Trinh:
An Efficient Certificateless Signature Scheme in the Standard Model. 175-192 - Sébastien Canard, Viet Cuong Trinh:
Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption. 193-211 - Maroti Deshmukh, Neeta Nain, Mushtaq Ahmed:
Enhanced Modulo Based Multi Secret Image Sharing Scheme. 212-224 - S. J. Sheela, K. V. Suresh, Deepaknath Tandur:
Performance Evaluation of Modified Henon Map in Image Encryption. 225-240
Network Security and Intrusion Detection
- Hidema Tanaka:
Network Counter-Attack Strategy by Topology Map Analysis. 243-262 - Mridul Sankar Barik, Chandan Mazumdar, Amarnath Gupta:
Network Vulnerability Analysis Using a Constrained Graph Data Model. 263-282 - Surendra Singh, Sachin Tripathi, Suvadip Batabyal:
Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid. 283-300
Privacy
- Kissan G. Gauns Dessai, Venkatesh V. Kamat:
A Framework for Analyzing Associativity and Anonymity in Conventional and Electronic Summative Examinations. 303-323 - Hardik Gajera, Shruti Naik, Manik Lal Das:
On the Security of "Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems". 324-335 - Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar:
Privacy Preserving Network Analysis of Distributed Social Networks. 336-355
Software Security
- Sanat Ghoshal, Goutam Paul:
Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data. 359-371 - Varsharani Hawanna, Vrushali Y. Kulkarni, Rashmi Rane, Pooja Joshi:
Risk Evaluation of X.509 Certificates - A Machine Learning Application. 372-389
Wireless, Mobile and IoT Security
- Ashish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni:
A Secure Routing Scheme for Wireless Mesh Networks. 393-408 - Venkata Udaya Sameer, S. Sugumaran, Ruchira Naskar:
Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches. 409-425 - Douglas Simões Silva, Davi Resner, Rick Lopes de Souza, Jean Everson Martina:
Formal Verification of a Cross-Layer, Trustful Space-Time Protocol for Wireless Sensor Networks. 426-443 - Sudhir Bagade, Vijay T. Raisinghani:
JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET. 444-458
Short Papers
- Sharvari Prakash Chorghe, Narendra Shekokar:
A Solution to Detect Phishing in Android Devices. 461-470 - T. Harsha, S. Asha, B. Soniya:
Feature Selection for Effective Botnet Detection Based on Periodicity of Traffic. 471-478 - Saurabh Chamotra, Rakesh Kumar Sehgal, Sanjeev Ror, Bhupendra Singh:
Honeypot Deployment in Broadband Networks. 479-488 - Jayaprakash Kar, Kshirasagar Naik:
Generic Construction of Certificateless Signcryption Scheme. 489-498 - RatnaKumari Challa, VijayaKumari Gunta:
Reed-Muller Code Based Symmetric Key Fully Homomorphic Encryption Scheme. 499-508 - Ömer Yüksel, Jerry den Hartog, Sandro Etalle:
Towards Useful Anomaly Detection for Back Office Networks. 509-520 - Vineeta Jain, Manoj Singh Gaur, Vijay Laxmi, Mohamed Mosbah:
Detection of SQLite Database Vulnerabilities in Android Apps. 521-531 - Lokesh Jain, Aditya Chandran, Sanjay Rawat, Kannan Srinathan:
Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach. 532-542
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.