Information Systems Security

14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings

  • Vinod Ganapathy
  • Trent Jaeger
  • R.K. Shyamasundar
Conference proceedings ICISS 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11281)

Also part of the Security and Cryptology book sub series (LNSC, volume 11281)

Table of contents

  1. Front Matter
    Pages I-XIX
  2. Ubiquitous Computing

    1. Front Matter
      Pages 1-1
    2. Kirk Boyer, Hao Chen, Jingwei Chen, Jian Qiu, Rinku Dewri
      Pages 3-23
    3. Bhagyesh Patil, Parjanya Vyas, R. K. Shyamasundar
      Pages 24-43
    4. K. Nimmy, Sriram Sankaran, Krishnashree Achuthan
      Pages 44-63
  3. Modeling and Analysis of Attacks

    1. Front Matter
      Pages 65-65
    2. Ghanshyam S. Bopche, Gopal N. Rai, B. M. Mehtre, G. R. Gangadharan
      Pages 67-87
    3. K. Aditya, Slawomir Grzonkowski, Nhien-An Le-Khac
      Pages 88-106
    4. Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, Venkat N. Venkatakrishnan
      Pages 107-126
  4. Smartphone Security

    1. Front Matter
      Pages 127-127
    2. Suryakanta Panda, Madhu Kumari, Samrat Mondal
      Pages 129-145
    3. Sreesh Kishore, Renuka Kumar, Sreeranga Rajan
      Pages 146-167
  5. Cryptography and Theory

    1. Front Matter
      Pages 169-169
    2. Jyotirmoy Pramanik, Partha Sarathi Roy, Sabyasachi Dutta, Avishek Adhikari, Kouichi Sakurai
      Pages 171-188
    3. Sumanta Chatterjee
      Pages 209-227
  6. Enterprise and Cloud Security

    1. Front Matter
      Pages 229-229
    2. Khaoula Es-Salhi, David Espes, Nora Cuppens
      Pages 231-250
    3. Alexandre Kabil, Thierry Duval, Nora Cuppens, Gérard Le Comte, Yoran Halgand, Christophe Ponchel
      Pages 272-287
  7. Machine Learning and Security

    1. Front Matter
      Pages 289-289
    2. Venkata Udaya Sameer, Ishaan Dali, Ruchira Naskar
      Pages 291-303
  8. Privacy

    1. Front Matter
      Pages 343-343
    2. Alexander Marsalek, Bernd Prünster, Bojan Suzic, Thomas Zefferer
      Pages 345-363
    3. Vishwas T. Patil, R. K. Shyamasundar
      Pages 364-385
    4. Ajinkya Rajput, K. Gopinath
      Pages 386-404
  9. Client Security and Authentication

    1. Front Matter
      Pages 405-405
    2. Suryakanta Panda, Samrat Mondal
      Pages 407-426
    3. Amit Pathania, B. S. Radhika, Rudrapatna Shyamasundar
      Pages 427-447
    4. Abhishek Tiwari, Rajarshi Pal
      Pages 448-461
  10. Invited Keynote

    1. Front Matter
      Pages 463-463
    2. Sourav Das, Aashish Kolluri, Prateek Saxena, Haifeng Yu
      Pages 465-480
  11. Back Matter
    Pages 481-481

About these proceedings


This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018.
The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication.


systems security software and application security network security formal methods and theory of security security for ubiquitous computing systems security and machine learning cryptography computer science internet world wide web authentication image processing smart cards software engineering image coding data mining privacy preserving software evaluation digital forensics public key cryptography

Editors and affiliations

  • Vinod Ganapathy
    • 1
  • Trent Jaeger
    • 2
  • R.K. Shyamasundar
    • 3
  1. 1.Indian Institute of ScienceBangaloreIndia
  2. 2.Pennsylvania State UniversityUniversity ParkUSA
  3. 3.Indian Institute of Technology BombayMumbaiIndia

Bibliographic information

Industry Sectors
Finance, Business & Banking
IT & Software