© 2009

Information Systems Security

5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings

  • Atul Prakash
  • Indranil Sen Gupta
Conference proceedings ICISS 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5905)

Table of contents

  1. Front Matter
  2. Keynote Talks

    1. Angelos D. Keromytis
      Pages 1-17
    2. Nataraj Nagaratnam
      Pages 18-18
    3. Marc Dacier, Van-Hau Pham, Olivier Thonnard
      Pages 19-37
    4. Venu Govindaraju
      Pages 38-38
  3. Authentication

    1. Matt Smart, Eike Ritter
      Pages 39-54
    2. Massimiliano Masi, Rosario Pugliese, Francesco Tiezzi
      Pages 55-70
    3. Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert Deng
      Pages 71-85
  4. Verification

    1. Michael Adjedj, Julien Bringer, Hervé Chabanne, Bruno Kindarji
      Pages 86-100
    2. P. Bera, S. K. Ghosh, Pallab Dasgupta
      Pages 117-131
  5. Systems Security

    1. Michael K. Reiter, Vyas Sekar, Chad Spensky, Zhenghao Zhang
      Pages 132-147
    2. Zhen Zhang, K. H. (Kane) Kim, Myeong-Ho Kang, Tianran Zhou, Byung-Ho Chung, Shin-Hyo Kim et al.
      Pages 148-162
    3. Ping Chen, Hai Xiao, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie
      Pages 163-177
  6. Behavior Analysis

    1. Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi
      Pages 178-192
    2. Vanessa Frias-Martinez, Salvatore J. Stolfo, Angelos D. Keromytis
      Pages 193-207
  7. Database Security

About these proceedings


This book constitutes the refereed proceedings of the 5th International Conference on Information Systems Security, ICISS 2009, held in Kolkata, India, in December 2009.

The 17 revised full papers and 4 short papers, presented together with 4 keynote talks were carefully reviewed and selected from 85 initial submissions. The papers are organized in topical sections on authentication, verification, systems security, behavior analysis, database security, and cryptography.


Radio-Frequency Identification (RFID) access control authentication authorization biometric biometrics complexity copyright protection cryptography intrusion detection network security networks privacy reversibility social networks

Editors and affiliations

  • Atul Prakash
    • 1
  • Indranil Sen Gupta
    • 2
  1. 1.Electrical Engineering and Computer Science DepartmentUniversity of MichiganAnn ArborUSA
  2. 2.Department of Computer Science and EngineeringIndian Institute of Technology KharagpurKharagpurIndia

Bibliographic information