default search action
SNDS 2014, Trivandrum, India
- Gregorio Martínez Pérez, Sabu M. Thampi, Ryan K. L. Ko, Lei Shu:
Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings. Communications in Computer and Information Science 420, Springer 2014, ISBN 978-3-642-54524-5
Security and Privacy in Networked Systems
- Rajat Saxena, Somnath Dey:
Collaborative Approach for Data Integrity Verification in Cloud Computing. 1-15 - C. R. Yamuna Devi, B. Shivaraj, S. H. Manjula, K. R. Venugopal, Lalit M. Patnaik:
EESOR: Energy Efficient Selective Opportunistic Routing in Wireless Sensor Networks. 16-31 - Sourav Sinha, Mamata Jenamani:
A Security Framework for Multi-authority Based e-Sealed Bid Auction System. 32-44 - K. P. Krishna Kumar, G. Geethakumari:
Analysis of Semantic Attacks in Online Social Networks. 45-56 - Sangeetha Dhamodaran, Vaidehi Vijayakumar, Valliammai Thirunavukkarasu, Aiswarya Ramesh:
Enhanced Security of PHR System in Cloud Using Prioritized Level Based Encryption. 57-69 - Anuradha Jadiya, Deepak Chatrabhuj Karia:
MM-SOAR: Modified SOAR Protocol Using Multiple Metrics for Wireless Mesh Network. 70-78 - Deepak Chatrabhuj Karia, Shravanee Shinde:
Clustering Based Routing Strategies for Energy Management in Ad-Hoc Networks. 79-90 - Jithin R, Priya Chandran:
Virtual Machine Isolation - A Survey on the Security of Virtual Machines. 91-102 - T. R. Venugopal Anandharajan, Marcharla Anjaneyulu Bhagyaveni:
Trust Based VM Consolidation in Cloud Data Centers. 103-114 - R. Deepa, S. Swamynathan:
A Trust Model for Directory-Based Service Discovery in Mobile Ad Hoc Networks. 115-126 - C. R. Yamuna Devi, Deepak Sunder, S. H. Manjula, K. R. Venugopal, Lalit M. Patnaik:
Chain Routing for Convergecast Small Scale Wireless Sensor Networks. 127-138 - Lovejit Singh, Sarbjeet Singh:
A Genetic Algorithm for Scheduling Workflow Applications in Unreliable Cloud Environment. 139-150 - S. Anithakumari, K. Chandra Sekaran:
Autonomic SLA Management in Cloud Computing Services. 151-159
Multimedia Security
- G. Jyothish Lal, V. K. Veena:
A Novel Audio Watermark Embedding and Extraction Method Based on Compressive Sensing, Sinusoidal Coding, Reduced SVD, Over Complete Dictionary and L1 Optimization. 160-171 - Nishanth Augustine, Sudhish N. George, P. P. Deepthi:
Compressive Sensing Based Audio Scrambling Using Arnold Transform. 172-183 - Dheerendra Mishra, Sourav Mukhopadhyay:
Cryptanalysis of Two Authentication Scheme for DRM System. 184-191 - Germain Jolly, Sylvain Vernois, Jean-Luc Lambert:
Improving Test Conformance of Smart Cards versus EMV-Specification by Using on the Fly Temporal Property Verification. 192-201 - Munaga V. N. K. Prasad, Ilaiah Kavati, B. Adinarayana:
Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Gabor Features. 202-210
Cryptosystems, Algorithms, Primitives
- Dibyendu Roy, Pratish Datta, Sourav Mukhopadhyay:
A New Variant of Algebraic Attack. 211-222 - Muhammad Asif Khan, Varun Jeoti:
A Novel Design of Chaos Based S-Box Using Difference Distribution Table (CD S-Box). 223-230 - Kanakkath Praveen, K. Rajeev, M. Sethumadhavan:
On the Extensions of (k, n)*-Visual Cryptographic Schemes. 231-238 - Mridul Sankar Barik, Chandan Mazumdar:
A Graph Data Model for Attack Graph Generation and Analysis. 239-250 - Appala Naidu Tentu, Prabal Paul, V. Ch. Venkaiah:
Computationally Perfect Secret Sharing Scheme Based on Error-Correcting Codes. 251-262 - Jayalakshmi G. Naragund, R. M. Banakar:
Warfare Message Communication in Tactical WMN Using HWMP. 263-274 - R. Anitha, Saswati Mukherjee:
Metadata Attribute Based Cipher-Key Generation System in Cloud. 275-287 - Dheerendra Mishra, Sourav Mukhopadhyay:
Cryptanalysis of Yang et al.'s Digital Rights Management Authentication Scheme Based on Smart Card. 288-297
System and Network Security
- Ratinder Kaur, Maninder Singh:
Automatic Evaluation and Signature Generation Technique for Thwarting Zero-Day Attacks. 298-309 - Anant V. Nimkar, Soumya K. Ghosh:
A Theoretical Study on Access Control Model in Federated Systems. 310-321 - Adrian Pauna, Victor Valeriu Patriciu:
CASSHH - Case Adaptive SSH Honeypot. 322-333 - Shree Garg, Anil Kumar Sarje, Sateesh Kumar Peddoju:
Improved Detection of P2P Botnets through Network Behavior Analysis. 334-345 - Nilesh Chakraborty, Samrat Mondal:
SLASS: Secure Login against Shoulder Surfing. 346-357 - R. Reno Robert:
Differential Execution Analysis for Obfuscation Reduction. 358-369
Short Papers
- Monika Darji, Bhushan Trivedi:
Emergency Aware, Non-invasive, Personalized Access Control Framework for IMDs. 370-381 - Bhavna Saini, Gaurav Somani:
Index Page Based EDoS Attacks in Infrastructure Cloud. 382-395 - Dinesh Nepolean, I. Karthik, Mu. Preethi, Rahul Goyal, M. Kathirvel Vanethi:
Privacy Preserving Ranked Keyword Search over Encrypted Cloud Data. 396-403 - Marcus Hardt, Arsen Hayrapetyan, A. Paul Millar, Ahmed Shiraz Memon:
Combining the X.509 and the SAML Federated Identity Management Systems. 404-415 - Venkatasamy Sureshkumar, Anitha Ramalingam:
Analysis of Electronic Voting Protocol Using Strand Space Model. 416-427 - Balu Sridevi, G. V. Shirley Julia, S. Rajaram:
Seamless Handoff of Ping-Pong Calls in Mobile Wimax Networks. 428-439 - Hiran V. Nath, Babu M. Mehtre:
Static Malware Analysis Using Machine Learning Methods. 440-450 - P. Badharudheen, Anu Mary Chacko, S. D. Madhu Kumar:
Making an Application Provenance-Aware through UML - A General Scheme. 451-460 - Balasubramanian Chelliah, S. Geetha:
Enhancing E-Payment Security through Biometric Based Personal Authentication Using Steganography Scheme - B-PASS. 461-472
Second International Workshop on Security in Self-Organising Networks (SelfNet 2014)
- Vijay Anand Pandian, T. Gireesh Kumar:
A Novel Cloud Based NIDPS for Smartphones. 473-484 - Saed Alrabaee, Khaled Khateeb, Fawaz Ali Khasawneh:
Preserving Database Privacy in Cloud Computing. 485-495 - Mahmoud Khasawneh, Izadeen Kajman, Rashed Alkhudaidy, Anwar Althubyani:
A Survey on Wi-Fi Protocols: WPA and WPA2. 496-511
Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS 2014)
- M. Sindhu, M. Sethumadhavan:
On the k-error Joint Linear Complexity and Error Multisequence over F q (char F q = p, prime). 512-519 - Payingat Jilna, P. P. Deepthi:
Implementation of an Elliptic Curve Based Message Authentication Code for Constrained Environments. 520-529 - Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor:
A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement. 530-539 - Musheer Ahmad, Parvez Mahmood Khan, Mohd. Zeeshan Ansari:
A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique. 540-550
Second International Workshop on Trust and Privacy in Cyberspace (CyberTrust 2014)
- Saumya Omanakuttan, Madhumita Chatterjee:
Experimental Analysis on Access Control Using Trust Parameter for Social Network. 551-562
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.