© 2016

Information Systems Security

12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings

  • Indrajit Ray
  • Manoj Singh Gaur
  • Mauro Conti
  • Dheeraj Sanghi
  • V. Kamakoti
Conference proceedings ICISS 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10063)

Also part of the Security and Cryptology book sub series (LNSC, volume 10063)

Table of contents

  1. Front Matter
    Pages I-XV
  2. Attacks and Mitigation

    1. Front Matter
      Pages 1-1
    2. Subhojeet Mukherjee, Hossein Shirazi, Indrakshi Ray, Jeremy Daily, Rose Gamble
      Pages 23-42
  3. Authentication

    1. Front Matter
      Pages 43-43
    2. Ankit Maheshwari, Samrat Mondal
      Pages 66-86
  4. Authorization and Information Flow Control

    1. Front Matter
      Pages 87-87
    2. Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia
      Pages 89-108
    3. Jerry den Hartog, Nicola Zannone
      Pages 109-130
    4. Kyrre Wahl Kongsgård, Nils Agne Nordbotten, Federico Mancini, Paal E. Engelstad
      Pages 131-150
  5. Cryptosystem and Protocols

    1. Front Matter
      Pages 173-173
    2. Sébastien Canard, Viet Cuong Trinh
      Pages 175-192
    3. Maroti Deshmukh, Neeta Nain, Mushtaq Ahmed
      Pages 212-224
    4. S. J. Sheela, K. V. Suresh, Deepaknath Tandur
      Pages 225-240
  6. Network Security and Intrusion Detection

    1. Front Matter
      Pages 241-241
    2. Mridul Sankar Barik, Chandan Mazumdar, Amarnath Gupta
      Pages 263-282

About these proceedings


This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016.

The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security. 


botnet cloud security denial-of-service internet of things social network analysis access control authentication data encryption feature extraction formal specification and verification genetic algorithm honeypots information retrieval phishing detection plagiarism provable security secure multiparty computation security analysis SVM wireless sensor networks

Editors and affiliations

  • Indrajit Ray
    • 1
  • Manoj Singh Gaur
    • 2
  • Mauro Conti
    • 3
  • Dheeraj Sanghi
    • 4
  • V. Kamakoti
    • 5
  1. 1.Colorado State UniversityFort CollinsUSA
  2. 2.Malaviya National Institute of TechnologyJaipurIndia
  3. 3.University of PaduaPaduaItaly
  4. 4.IIIT DelhiDelhiIndia
  5. 5.IIT MadrasMadrasIndia

Bibliographic information