Skip to main content
  • Conference proceedings
  • © 2018

Information Systems Security

14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11281)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISS: International Conference on Information Systems Security

Conference proceedings info: ICISS 2018.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, access via your institution.

Table of contents (24 papers)

  1. Front Matter

    Pages I-XIX
  2. Ubiquitous Computing

    1. Front Matter

      Pages 1-1
    2. A Characterization of the Mass Surveillance Potential of Road Traffic Monitors

      • Kirk Boyer, Hao Chen, Jingwei Chen, Jian Qiu, Rinku Dewri
      Pages 3-23
    3. SecSmartLock: An Architecture and Protocol for Designing Secure Smart Locks

      • Bhagyesh Patil, Parjanya Vyas, R. K. Shyamasundar
      Pages 24-43
    4. A Novel Multi-factor Authentication Protocol for Smart Home Environments

      • K. Nimmy, Sriram Sankaran, Krishnashree Achuthan
      Pages 44-63
  3. Modeling and Analysis of Attacks

    1. Front Matter

      Pages 65-65
    2. Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra

      • Ghanshyam S. Bopche, Gopal N. Rai, B. M. Mehtre, G. R. Gangadharan
      Pages 67-87
    3. RiskWriter: Predicting Cyber Risk of an Enterprise

      • K. Aditya, Slawomir Grzonkowski, Nhien-An Le-Khac
      Pages 88-106
    4. ProPatrol: Attack Investigation via Extracted High-Level Tasks

      • Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, Venkat N. Venkatakrishnan
      Pages 107-126
  4. Smartphone Security

    1. Front Matter

      Pages 127-127
    2. SGP: A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones

      • Suryakanta Panda, Madhu Kumari, Samrat Mondal
      Pages 129-145
    3. Towards Accuracy in Similarity Analysis of Android Applications

      • Sreesh Kishore, Renuka Kumar, Sreeranga Rajan
      Pages 146-167
  5. Cryptography and Theory

    1. Front Matter

      Pages 169-169
    2. Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters

      • Jyotirmoy Pramanik, Partha Sarathi Roy, Sabyasachi Dutta, Avishek Adhikari, Kouichi Sakurai
      Pages 171-188
    3. Secure Moderated Bargaining Game

      • Sumanta Chatterjee
      Pages 209-227
  6. Enterprise and Cloud Security

    1. Front Matter

      Pages 229-229
    2. SONICS: A Segmentation Method for Integrated ICS and Corporate System

      • Khaoula Es-Salhi, David Espes, Nora Cuppens
      Pages 231-250
    3. From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform

      • Alexandre Kabil, Thierry Duval, Nora Cuppens, GĂ©rard Le Comte, Yoran Halgand, Christophe Ponchel
      Pages 272-287

Other Volumes

  1. Information Systems Security

About this book

This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018.
The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication.

Keywords

  • systems security
  • software and application security
  • network security
  • formal methods and theory of security
  • security for ubiquitous computing systems
  • security and machine learning
  • cryptography
  • computer science
  • internet
  • world wide web
  • authentication
  • image processing
  • smart cards
  • software engineering
  • image coding
  • data mining
  • privacy preserving
  • software evaluation
  • digital forensics
  • public key cryptography

Editors and Affiliations

  • Indian Institute of Science, Bangalore, India

    Vinod Ganapathy

  • Pennsylvania State University, University Park, USA

    Trent Jaeger

  • Indian Institute of Technology Bombay, Mumbai, India

    R.K. Shyamasundar

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access