{"id":1054,"date":"2023-09-27T16:50:37","date_gmt":"2023-09-27T11:20:37","guid":{"rendered":"https:\/\/iciss.isrdc.in\/?page_id=1054"},"modified":"2024-01-16T11:15:47","modified_gmt":"2024-01-16T05:45:47","slug":"accepted-papers","status":"publish","type":"page","link":"https:\/\/iciss.isrdc.in\/accepted-papers\/","title":{"rendered":"Accepted Papers"},"content":{"rendered":"\n<h2>Regular Papers Track (Springer LNCS 14424)<\/h2>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Type of Acceptance<\/strong><\/td><td><strong>Paper ID<\/strong><\/td><td><strong>Paper Status<\/strong><\/td><td><strong>Title<\/strong><\/td><td><strong>Authors<\/strong><\/td><\/tr><tr><td>Full-Paper<\/td><td>17<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>A Security Analysis of Password Managers on Android<\/td><td>Abhyudaya Sharma and Sweta Mishra.<\/td><\/tr><tr><td>Full-Paper<\/td><td>56<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing<\/td><td>Thushara G A and S. Mary Saira Bhanu.<\/td><\/tr><tr><td>Full-Paper<\/td><td>86<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>STN-Net: A Robust GAN-Generated Face Detector<\/td><td>Tanusree Ghosh and Ruchira Naskar.<\/td><\/tr><tr><td>Full-Paper<\/td><td>85<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e$<\/td><td>Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self-Sovereign Identities<\/td><td>Cristian Alves dos Santos, Leandro Loffi and Carla Merkle Westphall.<\/td><\/tr><tr><td>Full-Paper<\/td><td>92<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>MDLDroid: Multimodal Deep Learning based Android Malware Detection<\/td><td>Narendra Singh and Somanath Tripathy.<\/td><\/tr><tr><td>Full-Paper<\/td><td>90<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e$<\/td><td>A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks<\/td><td>David Rodriguez and Ram Krishnan.<\/td><\/tr><tr><td>Full-Paper<\/td><td>68<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>Detection and Hardening Strategies to Secure an Enterprise Network<\/td><td>Preetam Mukherjee, Sabu M Thampi, Rohith N, Bishwajit Kumar Poddar and Ipshita Sen.<\/td><\/tr><tr><td>Full-Paper<\/td><td>64<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>Attack Graph Based Security Metrics For Dynamic Networks<\/td><td>Ayan Gain and Mridul Sankar Barik.<\/td><\/tr><tr><td>Full-Paper<\/td><td>20<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>Analysis of Optimal Number of Shards using ShardEval, A Simulator for Sharded Blockchains<\/td><td>Vishisht Priyadarshi, Sourav Goel and Kalpesh Kapoor.<\/td><\/tr><tr><td>Full-Paper<\/td><td>25<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e$<\/td><td>The Design and Application of a Unified Ontology for Cyber Security<\/td><td>Khandakar Ashrafi Akbar, Fariha Ishrat Rahman, Anoop Singhal, Latifur Khan and Bhavani Thuraisingham.<\/td><\/tr><tr><td>Full-Paper<\/td><td>36<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e$<\/td><td>Big Data Forensics on Apache Kafka<\/td><td>Thomas Mager.<\/td><\/tr><tr><td>Full-Paper<\/td><td>91<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>SoK: Digital Signatures and Taproot Transactions in Bitcoin<\/td><td>Anubha Jain and Emmanuel S Pilli.<\/td><\/tr><tr><td>Full-Paper<\/td><td>96<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>BCTPV-NIZK: Publicly-verifiable non-interactive zero-knowledge proof system from minimal blockchain assumptions<\/td><td>Nimish Mishra and Sk Hafizul Islam.<\/td><\/tr><tr><td>Full-Paper<\/td><td>103<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>A Survey on Security Threats and Mitigation Strategies for NoSQL Databases MongoDB as a Use Case<\/td><td>Surabhi Dwivedi, Balaji Rajendran, Praveen Ampatt and S D Sudarsan.<\/td><\/tr><tr><td>Full-Paper<\/td><td>67<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>Proof-of-Variable-Authority: A blockchain consensus mechanism for securing IoT networks<\/td><td>Pavithra Rajan, Lenoah Chacko, Varun Anilkumar and Vinod Pathari.<\/td><\/tr><tr><td>Full-Paper<\/td><td>24<\/td><td>\u2714\ufe0e\u00a9\u25fc\u20b9<\/td><td>An Efficient Two-Party ECDSA Scheme for Cryptocurrencies<\/td><td>Habeeb Syed, Arinjita Paul, Meena Singh and Rajan Ma.<\/td><\/tr><tr><td>Full-Paper<\/td><td>74<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology<\/td><td>Kamalakanta Sethi, Aniket Agrawal and Padmalochan Bera.<\/td><\/tr><tr><td>Full-Paper<\/td><td>78<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>Secure KNN Computation On Cloud<\/td><td>Tikaram Sanyashi, Nirmal Kumar Boran and Virendra Singh.<\/td><\/tr><tr><td>Short-Paper<\/td><td>23<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>Attack on the Privacy-Preserving Carpooling Service TAROT<\/td><td>Meghana Vargheese and Srinivas Vivek.<\/td><\/tr><tr><td>Short-Paper<\/td><td>37<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>Democracy in Your Hands!: Practical Multi-Key Homomorphic E-Voting<\/td><td>Tanusree Parbat, Aniket Banerjee and Ayantika Chatterjee.<\/td><\/tr><tr><td>Short-Paper<\/td><td>66<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>Theoretical Enumeration of Deployable Single-output Strong PUF Instances based on Uniformity and Uniqueness Constraints<\/td><td>Venkata Sreekanth Balijabudda, Kamalesh Acharya, Rajat Subhra Chakraborty and Indrajit Chakrabarti.<\/td><\/tr><tr><td>Short-Paper<\/td><td>81<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>An Energy-conscious surveillance scheme for intrusion detection in underwater sensor networks using Tunicate swarm optimization<\/td><td>Kammula Sunil Kumar, Veena Anand and Deepak Singh.<\/td><\/tr><tr><td>Short-Paper<\/td><td>33<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>A Multi-Stage Multi-Modal Classification Model for DeepFakes Combining Deep Learned and Computer Vision Oriented Features<\/td><td>Arnab Kumar Das, Soumik Mukhopadhyay, Arijit Dalui, Ritaban Bhattacharya and Ruchira Naskar.<\/td><\/tr><tr><td>Short-Paper<\/td><td>76<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>Crypto-Ransomware Detection: A Honey-file based approach using chi-square test<\/td><td>Ajith Arakkal, Shehzad Pazheri Sharafudheen and Vasudevan A R.<\/td><\/tr><tr><td>Short-Paper<\/td><td>107<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e$<\/td><td>Verifiable Timed Accountable Subgroup Multi-signatures<\/td><td>Duygu Ozden and O\u011euz Yayla.<\/td><\/tr><tr><td>Short-Paper<\/td><td>13<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>PSDP: Blockchain-Based Computationally Efficient Provably Secure Data Possession<\/td><td>Jayaprakash Kar.<\/td><\/tr><tr><td>Short-Paper<\/td><td>32<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things<\/td><td>Sourabh Bhaskar, Keyur Parmar and Devesh C. Jinwala.<\/td><\/tr><tr><td>Short-Paper<\/td><td>80<\/td><td>\u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9<\/td><td>Private and Verifiable Inter-bank Transactions and Settlements on Blockchain<\/td><td>Harika Narumanchi, Maddali Lakshmipadmaja and Nitesh Emmadi.<\/td><\/tr><\/tbody><\/table><figcaption>\u2714\ufe0e received ack. \u00a9 received copyright. \u25fc\ufe0e received camera-ready. <br>Presentation time for a full-paper is 30 mins (including Q&amp;A)<br>Presentation time for a short-paper is 20 mins (including Q&amp;A)<\/figcaption><\/figure>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2>Industry\/Demo Track<\/h2>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Type of Paper<\/strong><\/td><td><strong>Paper ID<\/strong><\/td><td><strong>Paper Status<\/strong><\/td><td><strong>Title<\/strong><\/td><td><strong>Authors<\/strong><\/td><\/tr><tr><td>Industry\/Demo Papers<\/td><td>114<\/td><td><\/td><td>PETA-Privacy Enabled Testing for AI systems based on FHE<\/td><td>Imtiyazuddin Shaik, Phani Sai Uppu, Mahalakshmi Pathivada, Divyesh Saglani, Harika Narumanchi, Sitarama Brahmam Gunturi and Rajan M A<\/td><\/tr><tr><td>Industry\/Demo Papers<\/td><td>115<\/td><td><\/td><td>Vajra: A Tool for Endpoint Management and Threat Detection<\/td><td>Arjun Sable, Yogesh C Jadhav, Manjesh Kumar Hanawal and Atul Kabra<\/td><\/tr><tr><td>Industry\/Demo Papers<\/td><td>111*<\/td><td><\/td><td>Defying the Invaders: Unveiling Threat Actors&#8217; Arsenal and Free &amp; Open-Source Solutions for Defence<\/td><td>Arpit Raj, Vedant Narayan and Vivek Muskan<\/td><\/tr><tr><td>Industry\/Demo Papers<\/td><td>110*<\/td><td><\/td><td>Dasthavej &#8211; A Web Based Document Management and Tracking System Powered by Stellar Blockchain<\/td><td>Harshavardhan Netha Gurram, Abhinav Sriram and Shivaram Vennam<\/td><\/tr><tr><td>Industry\/Demo Papers<\/td><td>95*<\/td><td><\/td><td>Vulnerability Assessment and Penetration Testing on Metasploitable2<\/td><td>Monish Kumar A, Neha Mailvakanan and Aditya Tarun S.<\/td><\/tr><\/tbody><\/table><figcaption>* Conditional Accept<br>\u2714\ufe0e received ack. \u00a9 received copyright. \u25fc\ufe0e received camera-ready.<br>Presentation time for a full-paper is 20 mins (including Q&amp;A). Once we prepare the Program of the Conference, we may accommodate your request to additional time. If you need more than 20 minutes, please write to ivishwas@gmail.com mentioning your Paper ID<\/figcaption><\/figure>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2>PhD Forum<\/h2>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong>Paper-ID<\/strong><\/td><td><strong>Title<\/strong><\/td><td><strong>Authors<\/strong><\/td><\/tr><tr><td>120<\/td><td>Designing an Efficient Authentication and Key Agree-ment Protocol for IOV by using 5G networks<\/td><td>Abhishelly Sharm, Garima Singh and Rohit Ahuja.<\/td><\/tr><tr><td>117<\/td><td>A technological compliance methodologies under Indian digital data protection framework<\/td><td>Ram Govind Singh.<\/td><\/tr><tr><td>119<\/td><td>Improved Backward Bias computation for Salsa20 Cipher<\/td><td>Sabyasachi Dey, Gregor Leander and Nitin Kumar Sharma.<\/td><\/tr><tr><td>126<\/td><td>GAN and DM generated Synthetic Image Detection in the Age of Misinformation<\/td><td>Tanusree Ghosh.<\/td><\/tr><tr><td>127<\/td><td>DeepFake Video Identification using General, Machine Learning and Deep Learning approaches<\/td><td>Arnab Kumar Das.<\/td><\/tr><tr><td>129<\/td><td>Attack Traffic Classification using Deep Learning<\/td><td>Nabanita Roy, Monit Kapoor and Sangita Roy.<\/td><\/tr><tr><td>121<\/td><td>A Blockchain driven Secure &amp; Traceable Grain Supply chain system<\/td><td>Preeti Grover, Sawroop Kaur and Rohit Ahuja.<\/td><\/tr><tr><td>118<\/td><td>BAKM-ITS: Blockchain for Vehicular Network Authentication and Key Management Concerning Intelligent Transportation Systems<\/td><td>Praneetha Surapaneni and Sriramulu Bojjagani.<\/td><\/tr><tr><td>112<\/td><td>Evaluation of Blockchain Security for IoT Technology Services: Survey<\/td><td>Nuras Naser Saeed Hizam and Madhukar Shelar.<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Regular Papers Track (Springer LNCS 14424) Type of Acceptance Paper ID Paper Status Title Authors Full-Paper 17 \u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9 A Security Analysis of Password Managers on Android Abhyudaya Sharma and Sweta Mishra. Full-Paper 56 \u2714\ufe0e\u00a9\u25fc\ufe0e\u20b9 Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing Thushara G A and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/pages\/1054"}],"collection":[{"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/comments?post=1054"}],"version-history":[{"count":93,"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/pages\/1054\/revisions"}],"predecessor-version":[{"id":1401,"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/pages\/1054\/revisions\/1401"}],"wp:attachment":[{"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/media?parent=1054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}