Advertisement

© 2018

Information Systems Security

14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings

  • Vinod Ganapathy
  • Trent Jaeger
  • R.K. Shyamasundar
Conference proceedings ICISS 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11281)

Also part of the Security and Cryptology book sub series (LNSC, volume 11281)

Table of contents

  1. Front Matter
    Pages I-XIX
  2. Ubiquitous Computing

    1. Front Matter
      Pages 1-1
    2. Kirk Boyer, Hao Chen, Jingwei Chen, Jian Qiu, Rinku Dewri
      Pages 3-23
    3. Bhagyesh Patil, Parjanya Vyas, R. K. Shyamasundar
      Pages 24-43
    4. K. Nimmy, Sriram Sankaran, Krishnashree Achuthan
      Pages 44-63
  3. Modeling and Analysis of Attacks

    1. Front Matter
      Pages 65-65
    2. Ghanshyam S. Bopche, Gopal N. Rai, B. M. Mehtre, G. R. Gangadharan
      Pages 67-87
    3. K. Aditya, Slawomir Grzonkowski, Nhien-An Le-Khac
      Pages 88-106
    4. Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, Venkat N. Venkatakrishnan
      Pages 107-126
  4. Smartphone Security

    1. Front Matter
      Pages 127-127
    2. Suryakanta Panda, Madhu Kumari, Samrat Mondal
      Pages 129-145
    3. Sreesh Kishore, Renuka Kumar, Sreeranga Rajan
      Pages 146-167
  5. Cryptography and Theory

    1. Front Matter
      Pages 169-169
    2. Jyotirmoy Pramanik, Partha Sarathi Roy, Sabyasachi Dutta, Avishek Adhikari, Kouichi Sakurai
      Pages 171-188
    3. Sumanta Chatterjee
      Pages 209-227
  6. Enterprise and Cloud Security

    1. Front Matter
      Pages 229-229
    2. Khaoula Es-Salhi, David Espes, Nora Cuppens
      Pages 231-250
    3. Alexandre Kabil, Thierry Duval, Nora Cuppens, Gérard Le Comte, Yoran Halgand, Christophe Ponchel
      Pages 272-287

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018.
The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication.

Keywords

systems security software and application security network security formal methods and theory of security security for ubiquitous computing systems security and machine learning cryptography computer science internet world wide web authentication image processing smart cards software engineering image coding data mining privacy preserving software evaluation digital forensics public key cryptography

Editors and affiliations

  • Vinod Ganapathy
    • 1
  • Trent Jaeger
    • 2
  • R.K. Shyamasundar
    • 3
  1. 1.Indian Institute of ScienceBangaloreIndia
  2. 2.Pennsylvania State UniversityUniversity ParkUSA
  3. 3.Indian Institute of Technology BombayMumbaiIndia

Bibliographic information