Ninth International Conference on Information Systems Security
(ICISS 2013)
16-20 December 2013, ISI Kolkata, India
























The conference series ICISS (International Conference on Information Systems Security), held annually, provides a forum for disseminating the latest research results in information and systems security. ICISS 2013 is the ninth in the series. The acceptance ratio of the past few conferences has averaged less than 30%, and the proceedings have been published as part of the Springer Verlag series of Lecture Notes in Computer Science. ICISS 2013 will be held in Kolkata, India from December 16 to 20, 2013. Kolkata is the largest metropolis of the state of West Bengal and is still considered to be a major intellectual and cultural hub of India. Kolkata hosts some of the finest educational institutions in India and has been the home to renowned scientists, reformers, artists, poets, and musicians. ICISS 2013 encourages submissions from academia, industry and government addressing theoretical and practical problems in information and systems security and related areas.


  • Manuscript Submission : July 12, 2013 July 21, 2013 (11.59 p.m., U.S. Mountain Time)
  • Tutorial Proposal Submission : July 5, 2013
  • Notification of Acceptance : August 25, 2013 
  • Camera-Ready Manuscript : September 13, 2013

List of Accepted Papers:

Regular Papers

Paper No. Authors Name Title
12 Pradweap Rv and Rc Hansdah

A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET

15 Koen Decroix, Jorn Lapon, Bart De Decker and Vincent Naessens A Framework for Formal Reasoning about Privacy Properties based on Trust Relationships in Complex Electronic Services
18 Angsuman Das and Avishek Adhikari Signcryption from Randomness Recoverable PKE Revisited
19 Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka and Takakazu Kurokawa Information Theoretical Analysis of Side-Channel Attack
23 Mathieu Jaume, R. Andriatsimandefitra, Valérie Viet Triem Tong and Ludovic Me Secure states versus Secure executions: From access control to flow control
30 Safaa Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia
and Vijay Atluri
Policy Mining: a Bottom-Up Approach Toward a Model Based Firewall Management
31 Subhamoy Maitra and Sourav Sen Gupta New long-term glimpse of RC4 stream cipher
39 Santanu Sarkar, Sourav Sengupta and Subhamoy Maitra Error correction of partially exposed RSA private keys from MSB side
46 Sourya Joyee De and Asim K. Pal Auctions with Rational Adversary
48 Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay and Gautam Paul RAPID-FeinSPN: A rapid prototyping framework for Feistal and SPN-based block ciphers
49 Beng Heng Ng and Atul Prakash Let the Right One In: Discovering and Mitigating Permission Gaps
54 Samiran Bag, Sushmita Ruj and Bimal Roy Jamming Resistant Schemes for Wireless Communication : A Combinatorial Approach
60 David Lorenzi, Jaideep Vaidya, Shamik Sural and Vijay Atluri Web Services Based Attacks against Image CAPTCHAs
62 Manisha Sharma, Shamik Sural, Vijay Atluri and Jaideep Vaidya An Administrative Model for Spatio-Temporal Role based Access Control
66 Sheethal Kumar, Jaipal Pai B J, Sourav Sen Gupta and Vigesh R Ungrapalli Traitor-traceable Key Pre-distribution based on Visual Secret Sharing
68 Imon Mukherjee and Goutam Paul Efficient Multi-bit Image Steganography in Spatial Domain
72 Nabanita Mukherjee, Ayon Bhattacharya and Siddhartha Bose Evolutionary Multibit Grouping Steganographic Algorithm
73 Y. Sreenivasa Rao and Ratna Dutta Recipient Anonymous Ciphertext-Policy Attribute Based Encryption
74 Anuj Shanker Saxena,Vikram Goyal and Debajyoti Bera Efficient Enforcement of Privacy for Moving Object Trajectories
79 Ankita Chaturvedi, Dheerendra Mishra and Sourav Mukhopadhyay Improved Biometric-based Three-factor Remote User Authentication Scheme with Key Agreement using Smart Card

Short Papers

Paper No. Authors Name Title
34 Harsha Kalutarage, Siraj A. Shaikh, Qin Zhou and Anne E. James Monitoring for Slow Suspicious Activities using a Target- centric Approach
37 Uma Ganugula and Ashutosh Saxena Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach
38 Yasser Sobhdel and Rasool Jalili A UC-secure authenticated contributory group key exchange protocol based on discrete logarithm
61 Soumyadev Maity and Hansdah A Voucher Assisted Adaptive Acknowledgement based R. C. Intrusion Detection Protocol for MANETs
65 Naveen Kumar, Anish Mathuria and Manik Lal Das An Efficient Time-Bound Hierarchical Key Assignment Scheme
70 Dheerendra Mishra and Sourav Mukhopadhyay Cryptanalysis of Pairing-free Identity-Based Authenticated Key Agreement Protocols


Past ICISS Conferences


15-19 December 2012
IIT Guwahati, India


15-19 December 2011,
Center For Distributed Computing,
Jadavpur University, Kolkata

15-19 December 2010 DA-IICT,
Gandhinagar Gujarat, India

14-18 December 2009 Eastern Zone
Cultural Center, Kolkata, India

16-20 December 2008 JNTU,
Hyderabad, India

16-20 December 2007
University of Delhi, India

17-21 December 2006
Indian Statistical institute, Kolkata, India

19-21 December 2005
Center For Distributed Computing,
Jadavpur University, Kolkata, India




SRISP © All Rights Reserved