The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Information Systems Security (iciss)
2009 (conf/iciss/2009)


  1. A Survey of Voice over IP Security Research. [Citation Graph (, )][DBLP]


  2. Security for a Smarter Planet. [Citation Graph (, )][DBLP]


  3. The WOMBAT Attack Attribution Method: Some Results. [Citation Graph (, )][DBLP]


  4. Biometrics and Security. [Citation Graph (, )][DBLP]


  5. Remote Electronic Voting with Revocable Anonymity. [Citation Graph (, )][DBLP]


  6. On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals. [Citation Graph (, )][DBLP]


  7. On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. [Citation Graph (, )][DBLP]


  8. Biometric Identification over Encrypted Data Made Feasible. [Citation Graph (, )][DBLP]


  9. Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity. [Citation Graph (, )][DBLP]


  10. Formal Verification of Security Policy Implementations in Enterprise Networks. [Citation Graph (, )][DBLP]


  11. Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles. [Citation Graph (, )][DBLP]


  12. An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products. [Citation Graph (, )][DBLP]


  13. DROP: Detecting Return-Oriented Programming Malicious Code. [Citation Graph (, )][DBLP]


  14. A Framework for Behavior-Based Malware Analysis in the Cloud. [Citation Graph (, )][DBLP]


  15. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs. [Citation Graph (, )][DBLP]


  16. Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders. [Citation Graph (, )][DBLP]


  17. Database Relation Watermarking Resilient against Secondary Watermarking Attacks. [Citation Graph (, )][DBLP]


  18. A Robust Damage Assessment Model for Corrupted Database Systems. [Citation Graph (, )][DBLP]


  19. A Generic Distortion Free Watermarking Technique for Relational Databases. [Citation Graph (, )][DBLP]


  20. On Some Weaknesses in the Disk Encryption Schemes EME and EME2. [Citation Graph (, )][DBLP]


  21. TWIS - A Lightweight Block Cipher. [Citation Graph (, )][DBLP]


  22. Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking. [Citation Graph (, )][DBLP]


  23. Method-Specific Java Access Control via RMI Proxy Objects Using Annotations. [Citation Graph (, )][DBLP]


  24. Let Only the Right One IN: Privacy Management Scheme for Social Network. [Citation Graph (, )][DBLP]


  25. Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper). [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002