


default search action
14th ICISS 2018: Bangalore, India
- Vinod Ganapathy, Trent Jaeger, R. K. Shyamasundar:

Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings. Lecture Notes in Computer Science 11281, Springer 2018, ISBN 978-3-030-05170-9
Ubiquitous Computing
- Kirk Boyer, Hao Chen, Jingwei Chen, Jian Qiu, Rinku Dewri

:
A Characterization of the Mass Surveillance Potential of Road Traffic Monitors. 3-23 - Bhagyesh V. Patil, Parjanya Vyas, R. K. Shyamasundar:

SecSmartLock: An Architecture and Protocol for Designing Secure Smart Locks. 24-43 - K. Nimmy

, Sriram Sankaran, Krishnashree Achuthan:
A Novel Multi-factor Authentication Protocol for Smart Home Environments. 44-63
Modeling and Analysis of Attacks
- Ghanshyam S. Bopche

, Gopal N. Rai
, Babu M. Mehtre
, G. R. Gangadharan
:
Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra. 67-87 - K. Aditya, Slawomir Grzonkowski, Nhien-An Le-Khac

:
RiskWriter: Predicting Cyber Risk of an Enterprise. 88-106 - Sadegh M. Milajerdi, Birhanu Eshete

, Rigel Gjomemo, Venkat N. Venkatakrishnan:
ProPatrol: Attack Investigation via Extracted High-Level Tasks. 107-126
Smartphone Security
- Suryakanta Panda

, Madhu Kumari, Samrat Mondal
:
SGP: A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones. 129-145 - Sreesh Kishore, Renuka Kumar, Sreeranga Rajan:

Towards Accuracy in Similarity Analysis of Android Applications. 146-167
Cryptography and Theory
- Jyotirmoy Pramanik

, Partha Sarathi Roy
, Sabyasachi Dutta
, Avishek Adhikari, Kouichi Sakurai:
Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters. 171-188 - Riddhi Ghosal, Sanjit Chatterjee:

Privacy Preserving Multi-server k-means Computation over Horizontally Partitioned Data. 189-208 - Sumanta Chatterjee

:
Secure Moderated Bargaining Game. 209-227
Enterprise and Cloud Security
- Khaoula Es-Salhi, David Espes

, Nora Cuppens:
SONICS: A Segmentation Method for Integrated ICS and Corporate System. 231-250 - Gaurav Pareek

, B. R. Purushothama
:
Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud. 251-271 - Alexandre Kabil

, Thierry Duval
, Nora Cuppens, Gérard Le Comte, Yoran Halgand, Christophe Ponchel:
From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform. 272-287
Machine Learning and Security
- Venkata Udaya Sameer, Ishaan Dali, Ruchira Naskar

:
A Deep Learning Based Digital Forensic Solution to Blind Source Identification of Facebook Images. 291-303 - Jamimamul Bakas

, Ruchira Naskar
:
A Digital Forensic Technique for Inter-Frame Video Forgery Detection Based on 3D CNN. 304-317 - Jamimamul Bakas

, Praneta Rawat, Kalyan Kokkalla, Ruchira Naskar
:
Re-compression Based JPEG Tamper Detection and Localization Using Deep Neural Network, Eliminating Compression Factor Dependency. 318-341
Privacy
- Alexander Marsalek, Bernd Prünster

, Bojan Suzic, Thomas Zefferer
:
SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform. 345-363 - Vishwas T. Patil, R. K. Shyamasundar:

Efficacy of GDPR's Right-to-be-Forgotten on Facebook. 364-385 - Ajinkya Rajput, K. Gopinath:

Analysis of Newer Aadhaar Privacy Models. 386-404
Client Security and Authentication
- Suryakanta Panda

, Samrat Mondal
:
drPass: A Dynamic and Reusable Password Generator Protocol. 407-426 - Amit Pathania, B. S. Radhika, Rudrapatna K. Shyamasundar:

MySecPol: A Client-Side Policy Language for Safe and Secure Browsing. 427-447 - Abhishek Tiwari, Rajarshi Pal:

Gaze-Based Graphical Password Using Webcam. 448-461
Invited Keynote
- Sourav Das, Aashish Kolluri, Prateek Saxena, Haifeng Yu:

(Invited Paper) on the Security of Blockchain Consensus Protocols. 465-480

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














