(1) Your paper has been accepted as a full length paper in the conference. Full length papers are limited to 20 pages for long paper and 10 pages for short paper in the Springer LNCS style. Deadline for submitting the camera ready copy is September 30, 2016. Please submit all the necessary documents as outlined below via email to the Publications Chair Sonal Yadav at email@example.com and cc to the PC Chair Indrajit Ray at Indrajit.Ray@Colostate.Edu.
(2) Please go over the reviewer's comments that were provided to you in the acceptance notification email. It is imperative that you have addressed all issues and concerns raised by the reviewer in your final camera ready copy.
(3) Complete instructions for preparing the camera-ready copy is available from the LNCS website at http://www.springer.com/us/computer-science/lncs/conference-proceedings-guidelines. Please use the document “Guidelines for proceedings authors” for information on LNCS stylistics conventions etc. The latest LaTeX style files as well as Word templates are also available from the site. Please use either LaTeX (preferred) or Word to prepare the camera ready copy.
(4) It is important that you do not try to “squeeze” your work to fit into the 20 pages for long paper and 10 pages for short paper limit by using formatting tactics such as (but not limited to) removing vertical spaces, or using different font sizes, or not adhering to the correct format for references.
(5) Springer needs all source files (LaTeX files with all the associated style files, special fonts and eps files, or Word or rtf files) and the final pdfs of all of the papers. References are to be supplied as Bbl files to avoid omission of data while conversion from Bib to Bbl. Please do not send any older versions of papers. There should be one set of source files and one pdf file per paper. Springer typesetters require the author-created pdfs in order to check the proper representation of symbols, figures, etc.
(6) In order for the paper to be published by Springer, a signed Copyright Form must be submitted together with the source files. Please complete the rest of the form, sign it and submit it by the deadline for submitting camera ready copy. It is okay for one of the authors to sign the form.
(7) Please include the documents from (5) and (6) into one single ZIP archive file and send via email to the Publications Chair Sonal Yadav firstname.lastname@example.org with cc to the PC Chair, Indrajit Ray, at Indrajit.Ray@Colostate.Edu.
(8) Please name your zipped archive with your paper number followed by ICISS2016. Also, in your email subject line include the paper number and ICISS 2016.
The copyright form is available at Copyright Form.
The copyright form is partially filled with conference titles and volume editors name. The Author(s) have to fill the following information and sign the copyright form and send us the scanned copy with Camera Ready Paper:
*Title of the Contribution: Paper title
*Author(s) Name(s): All corresponding Authors Name
*Corresponding Author’s Name, Address, Affiliation and Email: The information of the Author who will fill this form
Instruction for Foreign Author(s):
Please make sure that the copyright forms have been filled out correctly before sending the files, for example, that only authors employed by the EU (as an institution) tick that particular box. Some authors seem to think that if they work in a country in the European Union, they have to tick that box, which isn't true. Equally, the box for US Government employees should only be ticked by US Government employees.
► Kyrre Wahl Kongsgård, Nils Agne Nordbotten, Federico Mancini and Paal Engelstad. Data loss prevention based on text classification in controlled environments
► Jerry Den Hartog and Nicola Zannone. Collaborative Access Decisions: Why has my decision not been enforced?
► Ankit Maheshwari and Samrat Mondal. SPOSS: Secure Pin-based-authentication Obviating Shoulder Surfing
► Hidema Tanaka. Network counter-attack strategy by topology map analysis
► Jangirala Srinivas, Dheerendra Mishra and Sourav Mukhopadhyay. Secure lightweight user authentication and key agreement scheme for wireless sensor networks tailored for the Internet of Things environment
► Udaya Sameer Venkata, Sugumaran S and Ruchira Naskar. Digital Forensic Source Camera Identification with Efficient Feature Selection using Filter, Wrapper and Hybrid Approaches
► Sebastien Canard and Viet Cuong Trinh. An Efficient Certificateless Signature Scheme in the Standard Model
► Sebastien Canard and Viet Cuong Trinh. Constant-Size Ciphertext Attribute-based Encryption from Multi-Channel Broadcast Encryption
► Surendra Singh, Sachin Tripathi and Suvadip Batabyal. Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid
► Kristof Teichel, Dieter Sibold and Stefan Milius. An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms
► Varsha Bhat, Jaspal Singh and Sudarshan Iyengar. Privacy Preserving Network Analysis of Distributed Social Networks
► Ashish Nanda, Priyadarsi Nanda and Xiangjian He. A Secure Routing Scheme for Wireless Mesh Networks
► Douglas Simões Silva, Davi Resner, Rick Lopes de Souza and Jean Everson Martina. Formal Verication of a Cross-layer, Trustful Space-Time Protocol for Wireless Sensor Networks
► Angshuman Jana and Raju Halder. Defining Abstract Semantics for Static Dependence Analysis of Relational Database Application
► S. J. Sheela, K. V. Suresh and Deepaknath Tandur. Performance Evaluation of Modified Henon Map in Image Encryption
► Maroti Deshmukh, Neeta Nain and Mushtaq Ahmed. Enhanced Modulo based Multi Secret Image Sharing Scheme
► Mridul Sankar Barik, Chandan Mazumdar and Amarnath Gupta. Network Vulnerability Analysis using a Constrained Graph Data Model
► Sudhir Bagade and Vijay Raisinghani. JITWORM: Jitter Monitoring based Wormhole Attack Detection in MANET
► Varsha Hawanna. Risk Evaluation of X.509 Certificates – A Machine Learning Application
► Hardik Gajera, Shruti Naik and Manik Lal Das. On the security of "Verifiable Privacy-preserving Monitoring for Cloud-assisted mHealth Systems"
► Kissan Gauns Dessai and Venkatesh Kamat. A Framework for Analyzing Associativity & Anonymity in Conventional & Summative E-examinations
► Essaouini Nada, Cuppens Frederic and Cuppens Nora. Building a Fair System Using Access Rights
► Sanat Ghoshal and Goutam Paul. Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data
► Subhojeet Mukherjee, Hossein Shirazi, Indrakshi Ray, Jeremy Daily and Rose Gamble. Truckers Beware: Practical Denial-of-service Attacks in Embedded Networks of Commercial Vehicles
► Jayaprakash Kar and Sager Naik. Generic Construction of Certicateless Signcryption Scheme
► Omer Yuksel, Jerry Den Hartog and Sandro Etalle. Towards Useful Anomaly Detection for Back Office Networks
► Sharvari Chorghe and Narendra Shekokar. A Solution to detect Phishing in Android Devices
► Lokesh Jain, Aditya Chandran, Sanjay Rawat and Kannan Srinathan. Discovering Vulnerable Functions By Extrapolation: A Control-flow Graph Similarity Based Approach
► Asha S, Harsha T and Soniya Balram. FEATURE SELECTION FOR EFFECTIVE BOTNET DETECTION BASED ON PERIODICITY OF TRAFFIC
► Saurabh Chamotra, Rakesh Kumar Sehgal, Sanjeev Ror and Bhupendra Singh. Honeypot deployment in broadband Networks
► Ratnakumari Challa and Vijayakumari Gunta. Reed-Muller Code based Symmetric Key Fully Homomorphic Encryption Scheme
► Vineeta Jain, Manoj Singh Gaur, Vijay Laxmi and Mohamed Mosbah. Detection of Vulnerable Android Apps arising from Database Implementations