The following 23 papers have been selected to appear at the conference. They are
listed in the order they were submitted to the conference.
6: Riddhi Ghosal and Sanjit Chatterjee. Privacy Preserving Multi-Server k-means Computation over Horizontally Partitioned Data
7: Abhishek Tiwari and Rajarshi Pal. Gaze-Based Graphical Password Using Webcam
9: Khaoula Es-Salhi, Nora Cuppens and David Espes. SONICS: a segmentation method for integrated ICS and Corporate System
10: Amit Pathania, Radhika B S and Rudrapatna Shyamasundar. MySecPol: A Client-Side Policy Language for Safe and Secure Browsing
13: Udaya Sameer Venkata, Ishaan Dali and Ruchira Naskar. A Deep Learning based Digital Forensic Solution to Blind Source Identification of Facebook Images
16: Jamimamul Bakas and Ruchira Naskar. A Digital Forensic Technique for Inter-Frame Video Forgery Detection based on 3D CNN
18: Kirk Boyer, Hao Chen, Jingwei Chen, Jian Qui and Rinku Dewri. A Characterization of the Mass Surveillance Potential of Road Traffic Monitors
20: Bhagyesh Patil, Parjanya Vyas and R. K. Shyamasundar. SecSmartLock: An Architecture and Protocol for Designing Secure Smart Locks
25: Suryakanta Panda and Samrat Mondal. drPass: A Dynamic and Reusable Password Generator Protocol
26: Ghanshyam S. Bopche, Gopal N. Rai, B. M. Mehtre and G.R. Gangadharan. Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra
27: Jyotirmoy Pramanik, Partha Sarathi Roy, Sabyasachi Dutta, Avishek Adhikari and Kouichi Sakurai. Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters
31: Alexander Marsalek, Bernd PrĂ¼nster, Bojan Suzic and Thomas Zefferer. SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform
33: Suryakanta Panda, Madhu Kumari and Samrat Mondal. SGP: A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones
35: Gaurav Pareek and Purushothama B R. Proxy Re-encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud
37: Sumanta Chatterjee. Secure Moderated Bargaining Game
39: Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo and Venkat Venkatakrishnan. ProPatrol: Attack Investigation via Extracted High-Level Tasks
41: Vishwas Patil and Rk Shyamasundar. Efficacy of the Right-to-be-Forgotten on Facebook
47: Sreesh K, Renuka Kumar and Sreeranga Rajan. Towards Accuracy in Similarity Analysis of Android Applications
49: Nimmy K, Sriram Sankaran and Krishnashree Achuthan. A Novel Multi-factor Authentication Protocol for Smart Home Environments
51: Aditya K, Slawomir Grzonkowski and Nhienan Lekhac. RiskWriter: Predicting Cyber Risk of an Enterprise
53: Alexandre Kabil, Thierry Duval, Nora Cuppens-Boulahia, Gerard Le-Comte, Yoran Halgand and Christophe Ponchel. From Cyber Security Activities to Collaborative Virtual Environments Practices through the 3D CyberCOP Platform
55: Ajinkya Rajput and K. Gopinath. Analysis of Newer Aadhaar Privacy Models
56: Jamimamul Bakas, Praneta Rawat, Kalyan Kokkalla and Ruchira Naskar. Re-compression based JPEG Tamper Detection and Localization using Deep Neural Network, Eliminating Compression Factor Dependency