FIS 2015 aims to serve as a premier international forum for discussions, bringing together academic, industrial and governmental researchers along with practitioners, standards developers, policy makers and students interested in future information and communications security techniques, systems, and applications. The workshop also serves as a venue for learning about state-of-the-art in security and privacy research, giving attendees the opportunity to network with experts in the field.
Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, the following topic areas:
|Notification of Acceptance|
|Camera-ready Submission||10th December 2014|
|Workshop Date||10th January 2015|
Full papers must be submitted using the EasyChair submission system. If you don't have an EasyChair account, the link will allow you to create one.
First, ensure that you have formatted your paper according to the instructions in the Submission Guidelines above.
Papers are only accepted in PDF format.
After submitting your paper you will receive an automated reply from EasyChair. Some email systems may filter this email as spam - it is very important that you check if this is happening, and rectify it. Subsequent emails about your submission will be sent via EasyChair, and it is important that you receive them. Please direct any questions to Dr Ram Krishnan ([email protected])
To submit a paper for the FIS2015 Workshop, please use the following link: https://easychair.org/conferences/?conf=fis2015
Note: All Workshop papers (full papers - both regular and invited) WILL appear in IEEE Xplore.
University of Bradford, UK
Risk Assessment and Cyber Security in aircraft cabin network
Safety, reliability and security are three most important aspects in the air transport industry. The latter two have direct impacts to safety. This talk specifically focuses on the security aspect. In particular, risk and threat assessment methodology on aircraft security will be discussed based on the EUROCAE, ARINC and UK IS standards. An example of risk and threat analysis carried out in an aircraft communication network is discussed. Countermeasures for potential security threats are proposed.
New Directions in Mobile Web Authentication
Identity and authentication in the mobile web are important for many types of applications that benefit users, such as payments or dispatch. The mobile web today has several traditional approaches to authentication that allow for sensitive applications to take place. However, moving forward the use of contextual data can have a place in the area of authentication, Use of sensor information available on smartphones can provide information about user context that can serve either to augment existing authentication techniques or even provide additional authentication factors in their own right. This talk will provide an overview of existing techniques for mobile web authentication, and also discuss recent advances in hardware-based authentication.
|09:00 - 09:30||Registration|
|09:30 - 10:30||Keynote Speech 1|
|10:30 - 11:00||Tea/Coffee Break|
|11:00 - 12:00||Keynote Speech 2|
|12:00 - 13:00||Technical Session 1|
|13:00 - 14:00||Lunch|
|14:00 - 16:00||Technical Session 2|
|16:00 - 16:30||Tea/Coffee and Participant Mixer|
Presentations for Technical Session 1 (12:00 – 13:00 hrs)
12:00 – 12:30 hrs
Giulio Peretti, Vishwas Lakkundi and Michele Zorzi. BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things
12:30 – 13:00 hrs
Mrudula Sarvabhatla and Chandra Sekhar. An Energy Efficient Mutual Authentication Scheme for Secure Data Exchange in Health-Care Applications Using Wireless Body Sensor Network
Presentations for Technical Session 2 (14:00 – 15:30 hrs)
14:00 – 14:30 hrs
Swati Agarwal and Ashish Sureka. Using Common-Sense Knowledge-Base for Detecting Word Obfuscation in Adversarial Communication
14:30 – 15:00 hrs
Suraj Verma, Prashant Pillai and Yim-Fun Hu. Energy-Efficient Privacy Homomorphic Encryption Scheme for Multi-Sensor Data in WSNs
15:00 – 15:30 hrs
Giridhar Mandyam and Mike Milikich. Leveraging Contextual Data for Multifactor Authentication in the Mobile Web
15:30 – 16:00 hrs
Mrudula Sarvabhatla, Lakshmi Narayana and Chandra Sekhar. A Robust Mutual Authentication Scheme for Data Security in Cloud Architecture
University of Texas at San Antonioram.kri[email protected]
|Haitham Cruickshank||University of Surrey||United Kingdom|
|Zubair Baig||Edith Cowan University||Australia|
|Benjamin Aziz||Potsmouth University||United Kingdom|
|Ronald Petrlic||Saarland University||Germany|
|Lizzie Coles-Kemp||Royal Halloway University of London||United Kingdom|
|Ravishankar Borgaonkar||DEUTSCHE TELEKOM AG||Germany|
|Abhinav Srivastava||AT&T Labs Research||USA|
|Donghoon Shin||Arizona State University||USA|
|Xin Jin||Amazon.com Inc.||USA|
|Jae Park||University of Texas at San Antonio||USA|
|Rajkumar PV||University of Texas at San Antonio||USA|
|Christian Damsgaard Jensen||Technical University of Denmark||Denmark|