default search action
SSCC 2014: Delhi, India
- Jaime Lloret Mauri, Sabu M. Thampi, Danda B. Rawat, Di Jin:
Security in Computing and Communications - Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings. Communications in Computer and Information Science 467, Springer 2014, ISBN 978-3-662-44965-3
Security and Privacy in Networked Systems
- Ashok Kumar Das:
Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks. 1-9 - Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks. 10-19 - Sohini Roy, Ayan Kumar Das:
Secure Hierarchical Routing Protocol (SHRP) for Wireless Sensor Network. 20-29 - Jeril Kuriakose, V. Amruth, A. G. Sandesh, V. Abhilash, G. Prasanna Kumar, K. Nithin:
A Review on Mobile Sensor Localization. 30-44 - Mohit Miglani, Deepika Kukreja, Sanjay Kumar Dhurandher, B. V. Ramana Reddy:
Power Aware and Secure Dynamic Source Routing Protocol in Mobile Ad Hoc Networks. 45-56 - Satria Mandala, Kommineni Jenni, Md. Asri Ngadi, Maznah Kamat, Yahaya Coulibaly:
Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks. 57-67 - Jagpreet Sidhu, Sarbjeet Singh:
Peers Feedback and Compliance Based Trust Computation for Cloud Computing. 68-80 - Kandaswamy Gokulnath, V. Rhymend Uthariaraj:
Fair-Trust Evaluation Approach (F-TEA) for Cloud Environment. 81-91 - Shabana Rehman, Rahul Gautam:
Research on Access Control Techniques in SaaS of Cloud Computing. 92-100
Authentication and Access Control Systems
- Nilesh Chakraborty, Samrat Mondal:
Tag Digit Based Honeypot to Detect Shoulder Surfing Attack. 101-110 - L. Jani Anbarasi, Modigari Narendra, G. S. Anandha Mala:
Cheating Prevention Using Genetic Feature Based Key in Secret Sharing Schemes. 111-119 - M. Priyadharshini, J. Yowan, R. Baskaran:
Security Enhancement in Web Services by Detecting and Correcting Anomalies in XACML Policies at Design Level. 120-135 - Neenu Manmadhan, Hari Narayanan, Jayaraj Poroor, Krishnashree Achuthan:
Design for Prevention of Intranet Information Leakage via Emails. 136-148 - Dileep Kumar Pattipati, Appala Naidu Tentu, V. Ch. Venkaiah:
Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structures. 149-161
Encryption and Cryptography
- Subhas Barman, Samiran Chattopadhyay, Debasis Samanta:
An Approach to Cryptographic Key Exchange Using Fingerprint. 162-172 - Pankaj Kumar Sharma, Musheer Ahmad, Parvez Mahmood Khan:
Cryptanalysis of Image Encryption Algorithm Based on Pixel Shuffling and Chaotic S-box Transformation. 173-181 - Abhishek Kolazi, Sudhish N. George, P. P. Deepthi:
PWLCM Based Secure Measurement Matrix Generation for Secure Video Compressive Sensing. 182-191 - Ravi Kishore Kodali:
A Mathematical Analysis of Elliptic Curve Point Multiplication. 192-200
System and Network Security
- Harmeet Kaur Khanuja, Dattatraya S. Adane:
Forensic Analysis for Monitoring Database Transactions. 201-210 - Suash Deb, Simon Fong, Sabu M. Thampi:
Framework of Lightweight Secure Media Transfer for Mobile Law Enforcement Apps. 211-220 - Richa Mahajan, Rahul Hans:
A Novel Comparison Based Approach for Fault Tolerance in Mobile Agent Systems. 221-229 - Ivy Prathap, R. Anitha:
Watermark Detection in Spatial and Transform Domains Based on Tree Structured Wavelet Transform. 230-238 - Vijayendra Grampurohit, Vijay Kumar, Sanjay Rawat, Shatrunjay Rawat:
Category Based Malware Detection for Android. 239-249 - Ankita Wadhawan, Dinesh Kumar:
Design and Analysis of Online Punjabi Signature Verification System Using Grid Optimization. 250-262 - T. R. Reshmi, Shiney Matilda Manoharan, Krishnan Murugan:
Internal Hardware States Based Privacy Extension of IPv6 Addresses. 263-271 - Rachit Adhvaryu, Nikunj Domadiya:
An Improved EMHS Algorithm for Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database. 272-280 - Arti Dwivedi, Ashok Kumar Mittal, Suneet Dwivedi:
Secure Communication Using Four-Wing Hyper-Chaotic Attractor. 281-290 - V. Srihari, R. Anitha Nadarajan:
DDoS Detection System Using Wavelet Features and Semi-supervised Learning. 291-303 - Pitchai MohanaPriya, V. Akilandeswari, G. Akilarasu, S. Mercy Shalinie:
An Integrated Approach of E-RED and ANT Classification Methods for DRDoS Attacks. 304-312 - Celine Mary Stuart, Deepthi P. Pattathil:
Low Complex System for Physical Layer Security Using NLFG and QCLDPC Code. 313-324
Work-in-Progress
- Vikash Kumar Rai, Arun Mishra:
Authentication of Trusted Platform Module Using Processor Response. 325-334 - Kanakkath Praveen, M. Sethumadhavan:
Results on (2, n) Visual Cryptographic Scheme. 335-340 - Digambar Povar, G. Geethakumari:
A Heuristic Model for Performing Digital Forensics in Cloud Computing Environment. 341-352 - Monika Darji, Bhushan H. Trivedi:
Detection of Active Attacks on Wireless IMDs Using Proxy Device and Localization Information. 353-362 - Mukul Tiwari, Sumit Kumar:
Vulnerability of MR-ARP in Prevention of ARP Poisoning and Solution. 363-369 - Deepak Sangroha, Vishal Gupta:
Analyzer Router: An Approach to Detect and Recover from OSPF Attacks. 370-378 - Ghanshyam S. Bopche, Babu M. Mehtre:
Attack Graph Generation, Visualization and Analysis: Issues and Challenges. 379-390 - Ishu Jain, Rahul Johari, R. L. Ujjwal:
CAVEAT: Credit Card Vulnerability Exhibition and Authentication Tool. 391-399 - Jignesh C. Doshi, Maxwell Christian, Bhushan H. Trivedi:
SQL FILTER - SQL Injection Prevention and Logging Using Dynamic Network Filter. 400-406 - Shivani Sharma, Virendra Kumar Yadav, Saumya Batham:
Zero Distortion Technique: An Approach to Image Steganography Using Strength of Indexed Based Chaotic Sequence. 407-416 - Jitendra Lulla, Varsha Sharma:
Piracy Control Using Secure Disks. 417-430 - Gopinath V., Bhuvaneswaran R. S.:
Design of Security System of Portable Device: Securing XML Web Services with ECC. 431-439
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.