Skip to main content
  • Conference proceedings
  • © 2016

Information Systems Security

12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10063)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISS: International Conference on Information Systems Security

Conference proceedings info: ICISS 2016.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, access via your institution.

Table of contents (32 papers)

  1. Front Matter

    Pages I-XV
  2. Attacks and Mitigation

    1. Front Matter

      Pages 1-1
    2. Practical DoS Attacks on Embedded Networks in Commercial Vehicles

      • Subhojeet Mukherjee, Hossein Shirazi, Indrakshi Ray, Jeremy Daily, Rose Gamble
      Pages 23-42
  3. Authentication

    1. Front Matter

      Pages 43-43
    2. SPOSS: Secure Pin-Based-Authentication Obviating Shoulder Surfing

      • Ankit Maheshwari, Samrat Mondal
      Pages 66-86
  4. Authorization and Information Flow Control

    1. Front Matter

      Pages 87-87
    2. Building a Fair System Using Access Rights

      • Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia
      Pages 89-108
    3. Collaborative Access Decisions: Why Has My Decision Not Been Enforced?

      • Jerry den Hartog, Nicola Zannone
      Pages 109-130
    4. Data Loss Prevention Based on Text Classification in Controlled Environments

      • Kyrre Wahl Kongsgård, Nils Agne Nordbotten, Federico Mancini, Paal E. Engelstad
      Pages 131-150
  5. Cryptosystem and Protocols

    1. Front Matter

      Pages 173-173
    2. An Efficient Certificateless Signature Scheme in the Standard Model

      • Sébastien Canard, Viet Cuong Trinh
      Pages 175-192
    3. Enhanced Modulo Based Multi Secret Image Sharing Scheme

      • Maroti Deshmukh, Neeta Nain, Mushtaq Ahmed
      Pages 212-224
    4. Performance Evaluation of Modified Henon Map in Image Encryption

      • S. J. Sheela, K. V. Suresh, Deepaknath Tandur
      Pages 225-240
  6. Network Security and Intrusion Detection

    1. Front Matter

      Pages 241-241
    2. Network Vulnerability Analysis Using a Constrained Graph Data Model

      • Mridul Sankar Barik, Chandan Mazumdar, Amarnath Gupta
      Pages 263-282

Other Volumes

  1. Information Systems Security

About this book

This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016.

The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security. 

Keywords

  • botnet
  • cloud security
  • denial-of-service
  • internet of things
  • social network analysis
  • access control
  • authentication
  • data encryption
  • feature extraction
  • formal specification and verification
  • genetic algorithm
  • honeypots
  • information retrieval
  • phishing detection
  • plagiarism
  • provable security
  • secure multiparty computation
  • security analysis
  • SVM
  • wireless sensor networks

Editors and Affiliations

  • Colorado State University, Fort Collins, USA

    Indrajit Ray

  • Malaviya National Institute of Technology, Jaipur, India

    Manoj Singh Gaur

  • University of Padua, Padua, Italy

    Mauro Conti

  • IIIT Delhi, Delhi, India

    Dheeraj Sanghi

  • IIT Madras, Madras, India

    V. Kamakoti

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access