default search action
15th ICISS 2019: Hyderabad, India
- Deepak Garg, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar:
Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings. Lecture Notes in Computer Science 11952, Springer 2019, ISBN 978-3-030-36944-6
Smart Contracts
- Lucas M. Palma, Fernanda Oliveira Gomes, Martín A. Gagliotti Vigil, Jean Everson Martina:
A Transparent and Privacy-Aware Approach Using Smart Contracts for Car Insurance Reward Programs. 3-20 - Priyanka Pal, Sudharsana K. J. L., Rohith Balaji S.:
WiP: Criminal Smart Contract for Private Key Theft in End to End Encrypted Applications. 21-32
Formal Techniques
- Jonas Haglund, Roberto Guanciale:
Trustworthy Isolation of DMA Enabled Devices. 35-55
Access Control
- Aditya Dubey, Uttara Ravi, Somya Sharma, Barsha Mitra:
Toward Implementing Spatio-Temporal RBAC Extensions. 59-78 - Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri, Gerhard Rigoll:
VisMAP: Visual Mining of Attribute-Based Access Control Policies. 79-98 - Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Policy Reconciliation and Migration in Attribute Based Access Control. 99-120
Machine Learning
- Akhilesh Gangwar, Vadlamani Ravi:
WiP: Generative Adversarial Network for Oversampling Data in Credit Card Fraud Detection. 123-134
Distributed Systems
- Anasuya Acharya, Manoj Prabhakaran, Akash Trehan:
An Introduction to the CellTree Paradigm (Invited Paper). 137-153 - Ali A. Noroozi, Khayyam Salehi, Jaber Karimpour, Ayaz Isazadeh:
Secure Information Flow Analysis Using the PRISM Model Checker. 154-172
Cryptography
- Felix Hörandner, Sebastian Ramacher, Simon Roth:
Selective End-To-End Data-Sharing in the Cloud. 175-195 - Felix Hörandner, Franco Nieddu:
Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound Keys. 196-217 - Pranav Verma, Anish Mathuria, Sourish Dasgupta:
Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirements. 218-238 - Deepak Kumar Dalai, Santu Pal:
Wip: Degree Evaluation of Grain-v1. 239-251
Online Social Networks
- Bintu Kadhiwala, Sankita J. Patel:
A Novel k-Anonymization Approach to Prevent Insider Attack in Collaborative Social Network Data Publishing. 255-275
Images and Cryptography
- T. E. Jisha, Thomas Monoth:
WiP: Security Enhanced Size Invariant Visual Cryptography with Perfect Reconstruction of White Pixels. 279-289 - Eram Fatima, Saiful Islam:
A New High Capacity and Reversible Data Hiding Technique for Images. 290-304
Miscellaneous Mix
- Arkaprava Bhaduri Mandal, Tanmoy Kanti Das:
Anti-forensics of a NAD-JPEG Detection Scheme Using Estimation of DC Coefficients. 307-323 - Ghanshyam S. Bopche, Gopal N. Rai, B. Ramachandra Reddy, Babu M. Mehtre:
Differential Attack Graph-Based Approach for Assessing Change in the Network Attack Surface. 324-344
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.