Program (Check for micro-updates)


Date Schedule Details
29-1-2017
(Sunday)
17:30               Registration, Welcome and Network dinner
30-1-2017
(Monday)
09:00 - 09:55 Registration
10:00 - 10:45 Inaugural
11:00              Martyr’s day 2 minutes silence
11:05 - 11:25 High-tea
11:25 - 12:10 Keynote#1 (Mass Surveillance and Privacy - Bart Preneel, University of Leuven Belgium)
12:10 - 12:50 Keynote#2 (Data Obfuscation - Bimal Roy, ISI Kolkota)
13:00 - 14:00 Working Lunch
14:00 - 15:30 Technical Session#1 (papers)
15:50 - 17:30 Technical Session#2 (papers)
19:30 - 22:00 Conference Dinner & Cultural Program
31-1-2017
(Tuesday)
10:00 - 10:45 Keynote#3 (Whither Language based Security - R K Shyamasundar, IIT Bombay)
10:45 - 11:15 Keynote#4
11:30 - 13:30 Technical Session#3 (papers)
13:30 - 14:30 Working Lunch
14:30 - 16:00 Technical Session#4 (papers)
16:30 - 17:30 Technical Session#5 (papers)
19:30 - 21:00 Dinner
PhD Conclave – posters
1-2-2017
(Wednesday)
10:00 - 10:30 Keynote#5 (V Kamakoti, IIT Madras)
10:30 - 11:00 Keynote#6
11:20 - 13:30 PhD conclave presentations
13:30 - 14:30 Working Lunch
14:30 - 16:30 Interactions at PhD conclave, Panel discussion and Closing




Technical Session I

Public Key Infrastructure (PKI)
  • Sonika Singh and Sahadeo Padhye. Cryptanalysis Of NTRU With n Public Keys
  • Gérald Gavin and Stéphane Bonnevay. Combining imperfect knowledge of maybe corrupted sources
  • Dhiren Patel, Jay Bothra and Vasudev Patel. Blockchain Exhumed
  • Prabhat Kushwaha. Towards the Equivalence of Diffie-Hellman Problem and Discrete Logarithm Problem for Important Elliptic Curves Used in Practice



Technical Session II

Cryptography / Information Security - I
  • Aditi Gupta and Rishabh Kaushal. Towards Detecting Fake User Accounts in Facebook
  • Dipak Rabari and Yogesh Meghrajani. Lock and Key Share-based Random Grid Visual Secret Sharing Scheme for Grayscale and Color Images with Two Decoding Options
  • Pratyush Dikshit and Kunwar Singh. Efficient Weighted Threshold ECDSA for Securing Bitcoin Wallet



Technical Session III

Cloud Security
  • Ashish Singh and Kakali Chatterjee. A multi-dimensional trust and reputation calculation model for cloud computing environments
  • Amitesh Singh Rajput, Priyanka Singh and Balasubramanian Raman. CryptFine: Towards secure cloud based filtering in encrypted domain
  • Kamatchi Arjunan and Chirag Modi. An Enhanced Intrusion Detection Framework for Securing Network Layer of Cloud Computing
  • Shikha Rani and Syed Taqi Ali. Expressive key-policy attribute-based constant-size signature
  • Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan and Udaya Tupakula. Out-VM Monitoring for Malicious Network Packet Detection in Cloud



Technical Session IV

Cryptography / Information Security - II
  • Ping Zhang, Honggang Hu, Xianjun Hu and Xiaolong Yang. New Pseudorandom Number Generators From Block Ciphers
  • Payal Chaudhari and Manik Lal Das. A2BSE: Anonymous Attribute Based Searchable Encryption
  • Venkatesh Gauri Shankar, Gaurav Somani, Manoj Singh Gaur, Vijay Laxmi and Mauro Conti. AndroTaint: An Efficient Android Malware Detection Framework using Dynamic Taint Analysis



Technical Session V

Privacy and Mining
  • Alpendra Kumar Diwakar, Nikhil Kumar Singh and Deepak Singh Tomar. END USER PRIVACY PRESERVATION IN SOCIAL NETWORKS AGAINST NEIGHBORHOOD ATTACK
  • Rajni Goyal and Anupama Panigrahi. TO GET OPTIMAL BOUND OF ANNIHILATOR IMMUNITY BY HEURISTIC TECHNIQUE
  • Shiva Darshan S.L, Ajay Kumara M.A and Jaidhar C.D. Information Gain Score Computation for N-Grams Using Multiprocessing Model