Ninth International Conference on Information Systems Security
(ICISS 2013)
16-20 December 2013, ISI Kolkata, India
















Tentative Programme Schedule

Venue: Geology Auditorium, Indian Statistical Institute, 203, B.T.Road, Kolkata 700108, India

Conference Programme

December 18, 2013, Wednesday

8:30 – 9:00



Tea / Coffee Break


Keynote Talk – I (Chair: Professor Sushil Jajodia)

Prof. Chris Clifton, Purdue University, USA

Title:-  Challenges and Opportunities for Security with Differential Privacy

10:30-11:30 Welcome Meet and Hi-Tea


Technical Session – I; Access Control and Authorization (Chair: Professor Chandan Mazumdar)


• Secure states versus Secure executions: From access control to flow control - Mathieu Jaume, Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong and Ludovic Me


• Policy Mining: a Bottom-Up Approach Toward a Model Based Firewall Management - Safaa Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri and Stephane Morucci


• Let the Right One In: Discovering and Mitigating Permission Gaps - Beng Heng Ng and Atul Prakash


• An Administrative Model for Spatio-Temporal Role based Access Control - Manisha Sharma, Shamik Sural, Vijay Atluri and Jaideep Vaidya



Lunch Break


Technical Session – II; Steganography (Chair: Professor Atul Prakash)


• Information Theoretical Analysis of Side-Channel Attack - Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka and Takakazu Kurokawa

• Web Services Based Attacks against Image CAPTCHAs - David Lorenzi, Jaideep Vaidya, Shamik Sural and Vijay Atluri


• Efficient Multi-bit Image Steganography in Spatial Domain - Imon Mukherjee and Goutam Paul


• Evolutionary Multibit Grouping Steganographic Algorithm - Nabanita Mukherjee, Ayon Bhattacharya and Siddhartha Bose



Business meeting


December 19, 2013, Thursday

9:00 – 9:30



Keynote Talk – II (Chair: Professor Bimal Roy)

Dr. Florian Kerschbaum, SAP, Germany

Title:-  An Encrypted In-Memory Column-Store: The Onion Selection Problem


Technical Session – III; Privacy (Chair: Prof. Chris Clifton)


• A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET - Pradweap Rv and Rc Hansdah


• A Framework for Formal Reasoning about Privacy Properties based on Trust Relationships in Complex Electronic Services - Koen Decroix, Jorn Lapon, Bart De Decker and Vincent Naessens


• Auctions with Rational Adversary - Sourya Joyee De and Asim K. Pal


• Efficient Enforcement of Privacy for Moving Object Trajectories - Anuj Shanker Saxena, Vikram Goyal and Debajyoti Bera



Technical Session – IV; Key Management (Chair: Prof. Subhamoy Maitra)


• A UC-secure authenticated contributory group key exchange protocol based on discrete logarithm - Yasser Sobhdel and Rasool Jalili


• An Efficient Time-Bound Hierarchical Key Assignment Scheme - Naveen Kumar, Anish Mathuria and Manik Lal Das

• Cryptanalysis of Pairing-free Identity-Based Authenticated Key Agreement Protocols - Dheerendra Mishra and Sourav Mukhopadhyay



Lunch Break


Technical Session – V; Cryptography-1 (Chair: Dr. Goutam Paul)


• Signcryption from Randomness Recoverable PKE Revisited - Angsuman Das and Avishek Adhikari


• New long-term glimpse of RC4 stream cipher - Subhamoy Maitra and Sourav Sen Gupta

• Error Correction of Partially Exposed RSA Private Keys from MSB Side - Santanu Sarkar, Sourav Sen Gupta and Subhamoy Maitra

• Improved Biometric-based Three-factor Remote User Authentication Scheme with Key Agreement using Smart Card - Ankita Chaturvedi, Dheerendra Mishra and Sourav Mukhopadhyay



Students’ Interaction


Cultural Programme and Banquet


December 20, 2013, Friday

9:00 – 9:30



Keynote Talk III (Chair: Professor Aditya Bagchi)

Prof. Sharad Mehrotra, University of California at Irvine, USA

Title:- Risk Aware Approach to Data Confidentiality in Cloud Computing



Technical Session – V; ICryptography-2 (Chair: Dr. Sanjit Chatterjee)


• RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-based Block Ciphers - Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay and Goutam Paul


• Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach - Samiran Bag, Sushmita Ruj and Bimal Roy


• Traitor-traceable Key Pre-distribution based on Visual Secret Sharing - Sheethal Kumar, Jaipal Pai B J, Sourav Sen Gupta and Vigesh R Ungrapalli


• Recipient Anonymous Ciphertext-Policy Attribute Based Encryption - Y. Sreenivasa Rao and Ratna Dutta



Technical Session – VI; I Attacks (Chair: Dr. Anirban Sengupta)


• Monitoring for Slow Suspicious Activities using a Target-centric Approach - Harsha Kalutarage, Siraj A. Shaikh, Qin Zhou and Anne E. James

• Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach - Umadevi Ganugula and Ashutosh Saxena


• A Voucher Assisted Adaptive Acknowledgement based Intrusion Detection Protocol for MANETs - Soumyadev Maity and R. C. Hansdah



End of Conference and Lunch



SRISP © All Rights Reserved