REGISTRATION
PROCEEDINGS
CONTACT US


SPONSORS
|
The conference series ICISS (International Conference on Information Systems Security), held annually, provides a forum for disseminating the latest research results in information and systems security. ICISS 2013 is the ninth in the series. The acceptance ratio of the past few conferences has averaged less than 30%, and the proceedings have been published as part of the Springer Verlag series of Lecture Notes in Computer Science.
ICISS 2013 will be held in Kolkata, India from December 16 to 20, 2013. Kolkata is the largest metropolis of the state of West Bengal and is still considered to be a major intellectual and cultural hub of India. Kolkata hosts some of the finest educational institutions in India and has been the home to renowned scientists, reformers, artists, poets, and musicians. ICISS 2013 encourages submissions from academia, industry and government addressing theoretical and practical problems in information and systems security and related areas.
IMPORTANT DATES
|
-
Manuscript Submission :
July 12, 2013 July 21, 2013 (11.59 p.m., U.S. Mountain Time)
-
Tutorial Proposal Submission : July 5, 2013
-
Notification of Acceptance : August 25, 2013
-
Camera-Ready Manuscript : September 13, 2013
|
|
|
List of Accepted Papers:
Regular Papers
Paper No. |
Authors Name |
Title |
12 |
Pradweap Rv and Rc Hansdah |
A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET |
15 |
Koen Decroix, Jorn Lapon, Bart De Decker and Vincent Naessens |
A Framework for Formal Reasoning about Privacy Properties based on Trust Relationships in Complex Electronic Services |
18 |
Angsuman Das and Avishek Adhikari |
Signcryption from Randomness Recoverable PKE Revisited |
19 |
Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka and
Takakazu Kurokawa |
Information Theoretical Analysis of Side-Channel Attack |
23 |
Mathieu Jaume, R. Andriatsimandefitra, Valérie Viet Triem Tong
and Ludovic Me |
Secure states versus Secure executions: From access control to flow control |
30 |
Safaa Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia
and Vijay Atluri |
Policy Mining: a Bottom-Up Approach Toward a Model Based Firewall Management |
31 |
Subhamoy Maitra and Sourav Sen Gupta |
New long-term glimpse of RC4 stream cipher |
39 |
Santanu Sarkar, Sourav Sengupta and Subhamoy Maitra |
Error correction of partially exposed RSA private keys from MSB side |
46 |
Sourya Joyee De and Asim K. Pal |
Auctions with Rational Adversary |
48 |
Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay and Gautam Paul |
RAPID-FeinSPN: A rapid prototyping framework for Feistal and SPN-based block ciphers |
49 |
Beng Heng Ng and Atul Prakash |
Let the Right One In: Discovering and Mitigating Permission Gaps |
54 |
Samiran Bag, Sushmita Ruj and Bimal Roy |
Jamming Resistant Schemes for Wireless Communication : A Combinatorial Approach |
60 |
David Lorenzi, Jaideep Vaidya, Shamik Sural and Vijay Atluri |
Web Services Based Attacks against Image CAPTCHAs |
62 |
Manisha Sharma, Shamik Sural, Vijay Atluri and Jaideep Vaidya |
An Administrative Model for Spatio-Temporal Role based Access Control |
66 |
Sheethal Kumar, Jaipal Pai B J, Sourav Sen Gupta and Vigesh R Ungrapalli |
Traitor-traceable Key Pre-distribution based on Visual Secret Sharing |
68 |
Imon Mukherjee and Goutam Paul |
Efficient Multi-bit Image Steganography in Spatial Domain |
72 |
Nabanita Mukherjee, Ayon Bhattacharya and Siddhartha Bose |
Evolutionary Multibit Grouping Steganographic Algorithm |
73 |
Y. Sreenivasa Rao and Ratna Dutta |
Recipient Anonymous Ciphertext-Policy Attribute Based Encryption |
74 |
Anuj Shanker Saxena,Vikram Goyal and Debajyoti Bera |
Efficient Enforcement of Privacy for Moving Object Trajectories |
79 |
Ankita Chaturvedi, Dheerendra Mishra and Sourav Mukhopadhyay |
Improved Biometric-based Three-factor Remote User Authentication Scheme with Key Agreement using Smart Card |
Short Papers
Paper No. |
Authors Name |
Title |
34 |
Harsha Kalutarage, Siraj A. Shaikh, Qin Zhou and Anne E. James |
Monitoring for Slow Suspicious Activities using a Target- centric Approach |
37 |
Uma Ganugula and Ashutosh Saxena |
Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach |
38 |
Yasser Sobhdel and Rasool Jalili |
A UC-secure authenticated contributory group key exchange protocol based on discrete logarithm |
61 |
Soumyadev Maity and Hansdah |
A Voucher Assisted Adaptive Acknowledgement based R. C. Intrusion Detection Protocol for MANETs |
65 |
Naveen Kumar, Anish Mathuria and Manik Lal Das |
An Efficient Time-Bound Hierarchical Key Assignment Scheme |
70 |
Dheerendra Mishra and Sourav Mukhopadhyay |
Cryptanalysis of Pairing-free Identity-Based Authenticated Key Agreement Protocols |
Past ICISS Conferences
 |
|
 |
15-19 December 2012 IIT Guwahati, India |
|
15-19 December 2011, Center For Distributed Computing, Jadavpur University, Kolkata |
 |
 |
 |
15-19 December 2010 DA-IICT, Gandhinagar
Gujarat, India |
14-18 December
2009 Eastern Zone Cultural Center, Kolkata, India |
16-20 December 2008
JNTU, Hyderabad, India |
 |
 |
 |
16-20 December
2007 University of Delhi, India |
17-21 December 2006 Indian Statistical institute, Kolkata, India |
19-21 December 2005
Center For Distributed Computing, Jadavpur University, Kolkata,
India |
|