Ninth International Conference on Information Systems Security
(ICISS 2013)
16-20 December 2013, ISI Kolkata, India
http://www.iciss.org.in

REGISTRATION

 

 

 

PROCEEDINGS

CONTACT US

 

 

 

 

 

 

 

SPONSORS

ADVANCE PROGRAM

Tentative Programme Schedule

Venue: Geology Auditorium, Indian Statistical Institute, 203, B.T.Road, Kolkata 700108, India

Conference Programme

December 18, 2013, Wednesday

8:30 – 9:00

Registration

09:30-10:30

Tea / Coffee Break

10:30-11:30

Keynote Talk – I (Chair: Professor Sushil Jajodia)

Prof. Chris Clifton, Purdue University, USA

Title:-  Challenges and Opportunities for Security with Differential Privacy

10:30-11:30 Welcome Meet and Hi-Tea

11:30-13:30

Technical Session – I; Access Control and Authorization (Chair: Professor Chandan Mazumdar)

 

• Secure states versus Secure executions: From access control to flow control - Mathieu Jaume, Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong and Ludovic Me

 

• Policy Mining: a Bottom-Up Approach Toward a Model Based Firewall Management - Safaa Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri and Stephane Morucci

 

• Let the Right One In: Discovering and Mitigating Permission Gaps - Beng Heng Ng and Atul Prakash

 

• An Administrative Model for Spatio-Temporal Role based Access Control - Manisha Sharma, Shamik Sural, Vijay Atluri and Jaideep Vaidya

 

13:30-14:30

Lunch Break

14:30-16:30

Technical Session – II; Steganography (Chair: Professor Atul Prakash)

 

• Information Theoretical Analysis of Side-Channel Attack - Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka and Takakazu Kurokawa


• Web Services Based Attacks against Image CAPTCHAs - David Lorenzi, Jaideep Vaidya, Shamik Sural and Vijay Atluri

 

• Efficient Multi-bit Image Steganography in Spatial Domain - Imon Mukherjee and Goutam Paul

 

• Evolutionary Multibit Grouping Steganographic Algorithm - Nabanita Mukherjee, Ayon Bhattacharya and Siddhartha Bose

 

16:30

Business meeting

 

December 19, 2013, Thursday

9:00 – 9:30

Registration

9:00–10:00

Keynote Talk – II (Chair: Professor Bimal Roy)

Dr. Florian Kerschbaum, SAP, Germany

Title:-  An Encrypted In-Memory Column-Store: The Onion Selection Problem

10:00-12:00

Technical Session – III; Privacy (Chair: Prof. Chris Clifton)

 

• A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET - Pradweap Rv and Rc Hansdah

 

• A Framework for Formal Reasoning about Privacy Properties based on Trust Relationships in Complex Electronic Services - Koen Decroix, Jorn Lapon, Bart De Decker and Vincent Naessens

 

• Auctions with Rational Adversary - Sourya Joyee De and Asim K. Pal

 

• Efficient Enforcement of Privacy for Moving Object Trajectories - Anuj Shanker Saxena, Vikram Goyal and Debajyoti Bera

 

12:00-13:30

Technical Session – IV; Key Management (Chair: Prof. Subhamoy Maitra)

 

• A UC-secure authenticated contributory group key exchange protocol based on discrete logarithm - Yasser Sobhdel and Rasool Jalili

 

• An Efficient Time-Bound Hierarchical Key Assignment Scheme - Naveen Kumar, Anish Mathuria and Manik Lal Das


• Cryptanalysis of Pairing-free Identity-Based Authenticated Key Agreement Protocols - Dheerendra Mishra and Sourav Mukhopadhyay

 

13:30-14:30

Lunch Break

14:30-16:30

Technical Session – V; Cryptography-1 (Chair: Dr. Goutam Paul)

 

• Signcryption from Randomness Recoverable PKE Revisited - Angsuman Das and Avishek Adhikari

 

• New long-term glimpse of RC4 stream cipher - Subhamoy Maitra and Sourav Sen Gupta


• Error Correction of Partially Exposed RSA Private Keys from MSB Side - Santanu Sarkar, Sourav Sen Gupta and Subhamoy Maitra


• Improved Biometric-based Three-factor Remote User Authentication Scheme with Key Agreement using Smart Card - Ankita Chaturvedi, Dheerendra Mishra and Sourav Mukhopadhyay

 

16:30–17:30

Students’ Interaction

18:00

Cultural Programme and Banquet

 

December 20, 2013, Friday

9:00 – 9:30

Registration

9:00–10:00

Keynote Talk III (Chair: Professor Aditya Bagchi)

Prof. Sharad Mehrotra, University of California at Irvine, USA

Title:- Risk Aware Approach to Data Confidentiality in Cloud Computing

 

10:00-12:00

Technical Session – V; ICryptography-2 (Chair: Dr. Sanjit Chatterjee)

 

• RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-based Block Ciphers - Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay and Goutam Paul

 

• Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach - Samiran Bag, Sushmita Ruj and Bimal Roy

 

• Traitor-traceable Key Pre-distribution based on Visual Secret Sharing - Sheethal Kumar, Jaipal Pai B J, Sourav Sen Gupta and Vigesh R Ungrapalli

 

• Recipient Anonymous Ciphertext-Policy Attribute Based Encryption - Y. Sreenivasa Rao and Ratna Dutta

 

12:00-13:30

Technical Session – VI; I Attacks (Chair: Dr. Anirban Sengupta)

 

• Monitoring for Slow Suspicious Activities using a Target-centric Approach - Harsha Kalutarage, Siraj A. Shaikh, Qin Zhou and Anne E. James


• Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach - Umadevi Ganugula and Ashutosh Saxena

 

• A Voucher Assisted Adaptive Acknowledgement based Intrusion Detection Protocol for MANETs - Soumyadev Maity and R. C. Hansdah

 

13:30

End of Conference and Lunch

 

 

SRISP © All Rights Reserved