© 2008

Information Systems Security

4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings

  • R. Sekar
  • Arun K. Pujari
Conference proceedings ICISS 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5352)

Table of contents

  1. Biometrics, Forensics and Steganography

    1. Vivekananda Bhat K., Indranil Sengupta, Abhijit Das
      Pages 235-242
    2. Craig Wright, Dave Kleiman, Shyaam Sundhar R.S.
      Pages 243-257
  2. Practical Applications

    1. Enkh-Amgalan Baatarjav, Ram Dantu, Santi Phithakkitnukoon
      Pages 273-286
    2. Ludwig Fuchs, Günther Pernul
      Pages 287-302
  3. Keynote Address

  4. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India, in December 2008.

The 15 revised full papers, 4 short papers, and 2 research reports presented together with 4 keynote talks were carefully reviewed and selected from 81 submissions. The papers span a wide range of topics including access control, cryptography, forensics, formal methods and language-based security, intrusion detection, malware defense, network and Web security, operating system security, and privacy, and are organized in topical sections on languages and formal methods, protocols, ongoing research, intrusion detection, biometrics, forensics and steganography, and practical applications.


biometric bluetooth security complexity computer security decidability model checking privacy secure voting security service-oriented computing

Editors and affiliations

  • R. Sekar
    • 1
  • Arun K. Pujari
    • 2
  1. 1.Department of Computer ScienceStony Brook UniversityStony BrookUSA
  2. 2.Department of Computer and Information SciencesUniversity of HyderabadHyderabadIndia

Bibliographic information