Skip to main content
  • Conference proceedings
  • © 2013

Information Systems Security

9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings

  • Up-to-date results
  • State-of-the-art research
  • Fast-track conference proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8303)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISS: International Conference on Information Systems Security

Conference proceedings info: ICISS 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (29 papers)

  1. Front Matter

  2. Challenges and Opportunities for Security with Differential Privacy

    • Chris Clifton, Balamurugan Anandan
    Pages 1-13
  3. An Encrypted In-Memory Column-Store: The Onion Selection Problem

    • Florian Kerschbaum, Martin Härterich, Mathias Kohler, Isabelle Hang, Andreas Schaad, Axel Schröpfer et al.
    Pages 14-26
  4. Risk Aware Approach to Data Confidentiality in Cloud Computing

    • Kerim Yasin Oktay, Vaibhav Khadilkar, Murat Kantarcioglu, Sharad Mehrotra
    Pages 27-42
  5. Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card

    • Ankita Chaturvedi, Dheerendra Mishra, Sourav Mukhopadhyay
    Pages 63-77
  6. Signcryption from Randomness Recoverable PKE Revisited

    • Angsuman Das, Avishek Adhikari
    Pages 78-90
  7. Auctions with Rational Adversary

    • Sourya Joyee De, Asim K. Pal
    Pages 91-105
  8. Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management

    • Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri, Stephane Morucci
    Pages 133-147
  9. Secure States versus Secure Executions

    • Mathieu Jaume, Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong, Ludovic Mé
    Pages 148-162
  10. Monitoring for Slow Suspicious Activities Using a Target Centric Approach

    • Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James
    Pages 163-168
  11. RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers

    • Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay, Goutam Paul
    Pages 169-190
  12. Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme

    • Naveen Kumar, Anish Mathuria, Manik Lal Das
    Pages 191-198
  13. Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing

    • Sheethal Kumar, Pai B. J. Jaipal, Sourav Sen Gupta, Vigesh R. Ungrapalli
    Pages 199-213
  14. Web Services Based Attacks against Image CAPTCHAs

    • David Lorenzi, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri
    Pages 214-229
  15. New Long-Term Glimpse of RC4 Stream Cipher

    • Subhamoy Maitra, Sourav Sen Gupta
    Pages 230-238
  16. Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols

    • Dheerendra Mishra, Sourav Mukhopadhyay
    Pages 247-254

Other Volumes

  1. Information Systems Security

About this book

This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical problems in information and systems security and related areas.

Editors and Affiliations

  • Electronics & Communication Sciences Unit, Indian Statistical Institute, Kolkata, India

    Aditya Bagchi

  • Computer Science Department, Colorado State University, Fort Collins, USA

    Indrakshi Ray

Bibliographic Information

  • Book Title: Information Systems Security

  • Book Subtitle: 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings

  • Editors: Aditya Bagchi, Indrakshi Ray

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-642-45204-8

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2013

  • Softcover ISBN: 978-3-642-45203-1Published: 20 November 2013

  • eBook ISBN: 978-3-642-45204-8Published: 13 December 2013

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XVI, 404

  • Number of Illustrations: 70 b/w illustrations

  • Topics: Systems and Data Security, Cryptology, Computer Communication Networks

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access