default search action
14th ICISS 2018: Bangalore, India
- Vinod Ganapathy, Trent Jaeger, R. K. Shyamasundar:
Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings. Lecture Notes in Computer Science 11281, Springer 2018, ISBN 978-3-030-05170-9
Ubiquitous Computing
- Kirk Boyer, Hao Chen, Jingwei Chen, Jian Qiu, Rinku Dewri:
A Characterization of the Mass Surveillance Potential of Road Traffic Monitors. 3-23 - Bhagyesh V. Patil, Parjanya Vyas, R. K. Shyamasundar:
SecSmartLock: An Architecture and Protocol for Designing Secure Smart Locks. 24-43 - K. Nimmy, Sriram Sankaran, Krishnashree Achuthan:
A Novel Multi-factor Authentication Protocol for Smart Home Environments. 44-63
Modeling and Analysis of Attacks
- Ghanshyam S. Bopche, Gopal N. Rai, Babu M. Mehtre, G. R. Gangadharan:
Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra. 67-87 - K. Aditya, Slawomir Grzonkowski, Nhien-An Le-Khac:
RiskWriter: Predicting Cyber Risk of an Enterprise. 88-106 - Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, Venkat N. Venkatakrishnan:
ProPatrol: Attack Investigation via Extracted High-Level Tasks. 107-126
Smartphone Security
- Suryakanta Panda, Madhu Kumari, Samrat Mondal:
SGP: A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones. 129-145 - Sreesh Kishore, Renuka Kumar, Sreeranga Rajan:
Towards Accuracy in Similarity Analysis of Android Applications. 146-167
Cryptography and Theory
- Jyotirmoy Pramanik, Partha Sarathi Roy, Sabyasachi Dutta, Avishek Adhikari, Kouichi Sakurai:
Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters. 171-188 - Riddhi Ghosal, Sanjit Chatterjee:
Privacy Preserving Multi-server k-means Computation over Horizontally Partitioned Data. 189-208 - Sumanta Chatterjee:
Secure Moderated Bargaining Game. 209-227
Enterprise and Cloud Security
- Khaoula Es-Salhi, David Espes, Nora Cuppens:
SONICS: A Segmentation Method for Integrated ICS and Corporate System. 231-250 - Gaurav Pareek, B. R. Purushothama:
Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud. 251-271 - Alexandre Kabil, Thierry Duval, Nora Cuppens, Gérard Le Comte, Yoran Halgand, Christophe Ponchel:
From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform. 272-287
Machine Learning and Security
- Venkata Udaya Sameer, Ishaan Dali, Ruchira Naskar:
A Deep Learning Based Digital Forensic Solution to Blind Source Identification of Facebook Images. 291-303 - Jamimamul Bakas, Ruchira Naskar:
A Digital Forensic Technique for Inter-Frame Video Forgery Detection Based on 3D CNN. 304-317 - Jamimamul Bakas, Praneta Rawat, Kalyan Kokkalla, Ruchira Naskar:
Re-compression Based JPEG Tamper Detection and Localization Using Deep Neural Network, Eliminating Compression Factor Dependency. 318-341
Privacy
- Alexander Marsalek, Bernd Prünster, Bojan Suzic, Thomas Zefferer:
SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform. 345-363 - Vishwas T. Patil, R. K. Shyamasundar:
Efficacy of GDPR's Right-to-be-Forgotten on Facebook. 364-385 - Ajinkya Rajput, K. Gopinath:
Analysis of Newer Aadhaar Privacy Models. 386-404
Client Security and Authentication
- Suryakanta Panda, Samrat Mondal:
drPass: A Dynamic and Reusable Password Generator Protocol. 407-426 - Amit Pathania, B. S. Radhika, Rudrapatna K. Shyamasundar:
MySecPol: A Client-Side Policy Language for Safe and Secure Browsing. 427-447 - Abhishek Tiwari, Rajarshi Pal:
Gaze-Based Graphical Password Using Webcam. 448-461
Invited Keynote
- Sourav Das, Aashish Kolluri, Prateek Saxena, Haifeng Yu:
(Invited Paper) on the Security of Blockchain Consensus Protocols. 465-480
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.