Regular Papers Track (Springer LNCS 14424)
Type of Acceptance | Paper ID | Paper Status | Title | Authors |
Full-Paper | 17 | ✔︎©◼︎₹ | A Security Analysis of Password Managers on Android | Abhyudaya Sharma and Sweta Mishra. |
Full-Paper | 56 | ✔︎©◼︎₹ | Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing | Thushara G A and S. Mary Saira Bhanu. |
Full-Paper | 86 | ✔︎©◼︎₹ | STN-Net: A Robust GAN-Generated Face Detector | Tanusree Ghosh and Ruchira Naskar. |
Full-Paper | 85 | ✔︎©◼︎$ | Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self-Sovereign Identities | Cristian Alves dos Santos, Leandro Loffi and Carla Merkle Westphall. |
Full-Paper | 92 | ✔︎©◼︎₹ | MDLDroid: Multimodal Deep Learning based Android Malware Detection | Narendra Singh and Somanath Tripathy. |
Full-Paper | 90 | ✔︎©◼︎$ | A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks | David Rodriguez and Ram Krishnan. |
Full-Paper | 68 | ✔︎©◼︎₹ | Detection and Hardening Strategies to Secure an Enterprise Network | Preetam Mukherjee, Sabu M Thampi, Rohith N, Bishwajit Kumar Poddar and Ipshita Sen. |
Full-Paper | 64 | ✔︎©◼︎₹ | Attack Graph Based Security Metrics For Dynamic Networks | Ayan Gain and Mridul Sankar Barik. |
Full-Paper | 20 | ✔︎©◼︎₹ | Analysis of Optimal Number of Shards using ShardEval, A Simulator for Sharded Blockchains | Vishisht Priyadarshi, Sourav Goel and Kalpesh Kapoor. |
Full-Paper | 25 | ✔︎©◼︎$ | The Design and Application of a Unified Ontology for Cyber Security | Khandakar Ashrafi Akbar, Fariha Ishrat Rahman, Anoop Singhal, Latifur Khan and Bhavani Thuraisingham. |
Full-Paper | 36 | ✔︎©◼︎$ | Big Data Forensics on Apache Kafka | Thomas Mager. |
Full-Paper | 91 | ✔︎©◼︎₹ | SoK: Digital Signatures and Taproot Transactions in Bitcoin | Anubha Jain and Emmanuel S Pilli. |
Full-Paper | 96 | ✔︎©◼︎₹ | BCTPV-NIZK: Publicly-verifiable non-interactive zero-knowledge proof system from minimal blockchain assumptions | Nimish Mishra and Sk Hafizul Islam. |
Full-Paper | 103 | ✔︎©◼︎₹ | A Survey on Security Threats and Mitigation Strategies for NoSQL Databases MongoDB as a Use Case | Surabhi Dwivedi, Balaji Rajendran, Praveen Ampatt and S D Sudarsan. |
Full-Paper | 67 | ✔︎©◼︎₹ | Proof-of-Variable-Authority: A blockchain consensus mechanism for securing IoT networks | Pavithra Rajan, Lenoah Chacko, Varun Anilkumar and Vinod Pathari. |
Full-Paper | 24 | ✔︎©◼₹ | An Efficient Two-Party ECDSA Scheme for Cryptocurrencies | Habeeb Syed, Arinjita Paul, Meena Singh and Rajan Ma. |
Full-Paper | 74 | ✔︎©◼︎₹ | Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology | Kamalakanta Sethi, Aniket Agrawal and Padmalochan Bera. |
Full-Paper | 78 | ✔︎©◼︎₹ | Secure KNN Computation On Cloud | Tikaram Sanyashi, Nirmal Kumar Boran and Virendra Singh. |
Short-Paper | 23 | ✔︎©◼︎₹ | Attack on the Privacy-Preserving Carpooling Service TAROT | Meghana Vargheese and Srinivas Vivek. |
Short-Paper | 37 | ✔︎©◼︎₹ | Democracy in Your Hands!: Practical Multi-Key Homomorphic E-Voting | Tanusree Parbat, Aniket Banerjee and Ayantika Chatterjee. |
Short-Paper | 66 | ✔︎©◼︎₹ | Theoretical Enumeration of Deployable Single-output Strong PUF Instances based on Uniformity and Uniqueness Constraints | Venkata Sreekanth Balijabudda, Kamalesh Acharya, Rajat Subhra Chakraborty and Indrajit Chakrabarti. |
Short-Paper | 81 | ✔︎©◼︎₹ | An Energy-conscious surveillance scheme for intrusion detection in underwater sensor networks using Tunicate swarm optimization | Kammula Sunil Kumar, Veena Anand and Deepak Singh. |
Short-Paper | 33 | ✔︎©◼︎₹ | A Multi-Stage Multi-Modal Classification Model for DeepFakes Combining Deep Learned and Computer Vision Oriented Features | Arnab Kumar Das, Soumik Mukhopadhyay, Arijit Dalui, Ritaban Bhattacharya and Ruchira Naskar. |
Short-Paper | 76 | ✔︎©◼︎₹ | Crypto-Ransomware Detection: A Honey-file based approach using chi-square test | Ajith Arakkal, Shehzad Pazheri Sharafudheen and Vasudevan A R. |
Short-Paper | 107 | ✔︎©◼︎$ | Verifiable Timed Accountable Subgroup Multi-signatures | Duygu Ozden and OĞuz Yayla. |
Short-Paper | 13 | ✔︎©◼︎₹ | PSDP: Blockchain-Based Computationally Efficient Provably Secure Data Possession | Jayaprakash Kar. |
Short-Paper | 32 | ✔︎©◼︎₹ | Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things | Sourabh Bhaskar, Keyur Parmar and Devesh C. Jinwala. |
Short-Paper | 80 | ✔︎©◼︎₹ | Private and Verifiable Inter-bank Transactions and Settlements on Blockchain | Harika Narumanchi, Maddali Lakshmipadmaja and Nitesh Emmadi. |
Presentation time for a full-paper is 30 mins (including Q&A)
Presentation time for a short-paper is 20 mins (including Q&A)
Industry/Demo Track
Type of Paper | Paper ID | Paper Status | Title | Authors |
Industry/Demo Papers | 114 | PETA-Privacy Enabled Testing for AI systems based on FHE | Imtiyazuddin Shaik, Phani Sai Uppu, Mahalakshmi Pathivada, Divyesh Saglani, Harika Narumanchi, Sitarama Brahmam Gunturi and Rajan M A | |
Industry/Demo Papers | 115 | Vajra: A Tool for Endpoint Management and Threat Detection | Arjun Sable, Yogesh C Jadhav, Manjesh Kumar Hanawal and Atul Kabra | |
Industry/Demo Papers | 111* | Defying the Invaders: Unveiling Threat Actors’ Arsenal and Free & Open-Source Solutions for Defence | Arpit Raj, Vedant Narayan and Vivek Muskan | |
Industry/Demo Papers | 110* | Dasthavej – A Web Based Document Management and Tracking System Powered by Stellar Blockchain | Harshavardhan Netha Gurram, Abhinav Sriram and Shivaram Vennam | |
Industry/Demo Papers | 95* | Vulnerability Assessment and Penetration Testing on Metasploitable2 | Monish Kumar A, Neha Mailvakanan and Aditya Tarun S. |
✔︎ received ack. © received copyright. ◼︎ received camera-ready.
Presentation time for a full-paper is 20 mins (including Q&A). Once we prepare the Program of the Conference, we may accommodate your request to additional time. If you need more than 20 minutes, please write to ivishwas@gmail.com mentioning your Paper ID
PhD Forum
Paper-ID | Title | Authors |
120 | Designing an Efficient Authentication and Key Agree-ment Protocol for IOV by using 5G networks | Abhishelly Sharm, Garima Singh and Rohit Ahuja. |
117 | A technological compliance methodologies under Indian digital data protection framework | Ram Govind Singh. |
119 | Improved Backward Bias computation for Salsa20 Cipher | Sabyasachi Dey, Gregor Leander and Nitin Kumar Sharma. |
126 | GAN and DM generated Synthetic Image Detection in the Age of Misinformation | Tanusree Ghosh. |
127 | DeepFake Video Identification using General, Machine Learning and Deep Learning approaches | Arnab Kumar Das. |
129 | Attack Traffic Classification using Deep Learning | Nabanita Roy, Monit Kapoor and Sangita Roy. |
121 | A Blockchain driven Secure & Traceable Grain Supply chain system | Preeti Grover, Sawroop Kaur and Rohit Ahuja. |
118 | BAKM-ITS: Blockchain for Vehicular Network Authentication and Key Management Concerning Intelligent Transportation Systems | Praneetha Surapaneni and Sriramulu Bojjagani. |
112 | Evaluation of Blockchain Security for IoT Technology Services: Survey | Nuras Naser Saeed Hizam and Madhukar Shelar. |