Information Systems Security

13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings

  • Rudrapatna K. Shyamasundar
  • Virendra Singh
  • Jaideep Vaidya
Conference proceedings ICISS 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10717)

Also part of the Security and Cryptology book sub series (LNSC, volume 10717)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Invited Papers

    1. Front Matter
      Pages 1-1
    2. Luigi V. Mancini, Andrea Monti, Agostino Panico
      Pages 9-26
  3. Privacy/Cryptography

    1. Front Matter
      Pages 27-27
    2. Mahender Kumar, C. P. Katti, P. C. Saxena
      Pages 29-49
    3. Sanjeet Kumar Nayak, Somanath Tripathy
      Pages 50-67
    4. Payal Chaudhari, Manik Lal Das, Dipankar Dasgupta
      Pages 88-103
  4. Systems Security

    1. Front Matter
      Pages 105-105
    2. Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet
      Pages 127-145
    3. Jay Dave, Shweta Saharan, Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur
      Pages 164-176
  5. Security Analysis

    1. Front Matter
      Pages 177-177
    2. Varun Garg, Anish Mathuria
      Pages 179-193
    3. Sandeep Rai, Rushang Dhanesha, Sreyans Nahata, Bernard Menezes
      Pages 194-208
    4. Ganesh Ram Santhanam, Benjamin Holland, Suresh Kothari, Nikhil Ranade
      Pages 209-230
    5. Nachiket Trivedi, Manik Lal Das
      Pages 231-240
  6. Identity Management and Access Control

    1. Front Matter
      Pages 241-241

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017.

The 17 revised full papers and 7 short papers presented together with 2 invited papers were carefully reviewed and selected from 73 submissions. The papers address the following topics:  privacy/cryptography, systems security, security analysis, identity management and access control, security attacks and detection, network security.

Keywords

authentication computer crime computer operating systems computer science cryptography data privacy internet malwares network security public key cryptography security systems semantics telecommunication networks wireless telecommunication systems

Editors and affiliations

  • Rudrapatna K. Shyamasundar
    • 1
  • Virendra Singh
    • 2
  • Jaideep Vaidya
    • 3
  1. 1.Indian Institute of Technology BombayMumbaiIndia
  2. 2.Indian Institute of Technology BombayMumbaiIndia
  3. 3.Rutgers UniversityNewarkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-72598-7
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-72597-0
  • Online ISBN 978-3-319-72598-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Electronics
Telecommunications
Consumer Packaged Goods
Energy, Utilities & Environment
Aerospace