default search action
19th ICISS 2023: Raipur, India
- Vallipuram Muthukkumarasamy, Sithu D. Sudarsan, Rudrapatna K. Shyamasundar:
Information Systems Security - 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings. Lecture Notes in Computer Science 14424, Springer 2023, ISBN 978-3-031-49098-9
Systems Security
- Abhyudaya Sharma, Sweta Mishra:
A Security Analysis of Password Managers on Android. 3-22 - Khandakar Ashrafi Akbar, Fariha Ishrat Rahman, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham:
The Design and Application of a Unified Ontology for Cyber Security. 23-41 - Thomas Mager:
Big Data Forensics on Apache Kafka. 42-56 - Surabhi Dwivedi, R. Balaji, Praveen Ampatt, Sithu D. Sudarsan:
A Survey on Security Threats and Mitigation Strategies for NoSQL Databases - MongoDB as a Use Case. 57-76 - Venkata Sreekanth Balijabudda, Kamalesh Acharya, Rajat Subhra Chakraborty, Indrajit Chakrabarti:
Theoretical Enumeration of Deployable Single-Output Strong PUF Instances Based on Uniformity and Uniqueness Constraints. 77-87
Network Security
- Preetam Mukherjee, Sabu M. Thampi, N. Rohith, Bishwajit Kumar Poddar, Ipshita Sen:
Detection and Hardening Strategies to Secure an Enterprise Network. 91-108 - Ayan Gain, Mridul Sankar Barik:
Attack Graph Based Security Metrics for Dynamic Networks. 109-128 - Sunil Kumar Kammula, Veena Anand, Deepak Singh:
An Energy-Conscious Surveillance Scheme for Intrusion Detection in Underwater Sensor Networks Using Tunicate Swarm Optimization. 129-138
Security Using AI/ML
- Tanusree Ghosh, Ruchira Naskar:
STN-Net: A Robust GAN-Generated Face Detector. 141-158 - Narendra Singh, Somanath Tripathy:
MDLDroid: Multimodal Deep Learning Based Android Malware Detection. 159-177 - David Rodriguez, Ram Krishnan:
A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks. 178-196 - Tikaram Sanyashi, Nirmal Kumar Boran, Virendra Singh:
Secure KNN Computation on Cloud. 197-216 - Arnab Kumar Das, Soumik Mukhopadhyay, Arijit Dalui, Ritaban Bhattacharya, Ruchira Naskar:
A Multi-stage Multi-modal Classification Model for DeepFakes Combining Deep Learned and Computer Vision Oriented Features. 217-226
Privacy
- Nishanth Chandran:
Security and Privacy in Machine Learning. 229-248 - Meghana Vargheese, Srinivas Vivek:
Attack on the Privacy-Preserving Carpooling Service TAROT. 249-258 - Tanusree Parbat, Aniket Banerjee, Ayantika Chatterjee:
Democracy in Your Hands!: Practical Multi-key Homomorphic E-Voting. 259-271
Cryptography
- G. A. Thushara, S. Mary Saira Bhanu:
Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing. 275-294 - Duygu Ozden, Oguz Yayla:
Verifiable Timed Accountable Subgroup Multi-signatures. 295-305 - Sourabh Bhaskar, Keyur Parmar, Devesh C. Jinwala:
Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things. 306-316
Blockchains
- Cristian Alves dos Santos, Leandro Loffi, Carla Merkle Westphall:
Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self-Sovereign Identities. 319-338 - Vishisht Priyadarshi, Sourav Goel, Kalpesh Kapoor:
Analysis of Optimal Number of Shards Using ShardEval, A Simulator for Sharded Blockchains. 339-359 - Anubha Jain, Emmanuel S. Pilli:
SoK: Digital Signatures and Taproot Transactions in Bitcoin. 360-379 - Nimish Mishra, SK Hafizul Islam:
BCTPV-NIZK: Publicly-Verifiable Non-interactive Zero-Knowledge Proof System from Minimal Blockchain Assumptions. 380-395 - Lenoah Chacko, Pavithra Rajan, Varun Anilkumar, Vinod Pathari:
Proof-of-Variable-Authority: A Blockchain Consensus Mechanism for Securing IoT Networks. 396-410 - Habeeb Syed, Arinjita Paul, Meena Singh Dilip Singh, M. A. Rajan:
An Efficient Two-Party ECDSA Scheme for Cryptocurrencies. 411-430 - Kamalakanta Sethi, Aniket Agrawal, Padmalochan Bera:
Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology. 431-448 - Ajith Arakkal, Shehzad Pazheri Sharafudheen, A. R. Vasudevan:
Crypto-Ransomware Detection: A Honey-File Based Approach Using Chi-Square Test. 449-458 - Jayaprakash Kar:
PSDP: Blockchain-Based Computationally Efficient Provably Secure Data Possession. 459-468 - Harika Narumanchi, Lakshmi Padmaja Maddali, Nitesh Emmadi:
Private and Verifiable Inter-bank Transactions and Settlements on Blockchain. 469-479
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.