


default search action
SSCC 2014: Delhi, India
- Jaime Lloret Mauri, Sabu M. Thampi

, Danda B. Rawat, Di Jin:
Security in Computing and Communications - Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings. Communications in Computer and Information Science 467, Springer 2014, ISBN 978-3-662-44965-3
Security and Privacy in Networked Systems
- Ashok Kumar Das:

Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks. 1-9 - Vanga Odelu

, Ashok Kumar Das, Adrijit Goswami:
Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks. 10-19 - Sohini Roy, Ayan Kumar Das:

Secure Hierarchical Routing Protocol (SHRP) for Wireless Sensor Network. 20-29 - Jeril Kuriakose

, V. Amruth, A. G. Sandesh, V. Abhilash, G. Prasanna Kumar
, K. Nithin:
A Review on Mobile Sensor Localization. 30-44 - Mohit Miglani, Deepika Kukreja, Sanjay Kumar Dhurandher, B. V. Ramana Reddy:

Power Aware and Secure Dynamic Source Routing Protocol in Mobile Ad Hoc Networks. 45-56 - Satria Mandala

, Kommineni Jenni
, Md. Asri Ngadi, Maznah Kamat, Yahaya Coulibaly:
Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks. 57-67 - Jagpreet Sidhu, Sarbjeet Singh

:
Peers Feedback and Compliance Based Trust Computation for Cloud Computing. 68-80 - Kandaswamy Gokulnath, V. Rhymend Uthariaraj:

Fair-Trust Evaluation Approach (F-TEA) for Cloud Environment. 81-91 - Shabana Rehman, Rahul Gautam:

Research on Access Control Techniques in SaaS of Cloud Computing. 92-100
Authentication and Access Control Systems
- Nilesh Chakraborty, Samrat Mondal:

Tag Digit Based Honeypot to Detect Shoulder Surfing Attack. 101-110 - L. Jani Anbarasi, Modigari Narendra, G. S. Anandha Mala:

Cheating Prevention Using Genetic Feature Based Key in Secret Sharing Schemes. 111-119 - M. Priyadharshini, J. Yowan, R. Baskaran:

Security Enhancement in Web Services by Detecting and Correcting Anomalies in XACML Policies at Design Level. 120-135 - Neenu Manmadhan, Hari Narayanan, Jayaraj Poroor, Krishnashree Achuthan:

Design for Prevention of Intranet Information Leakage via Emails. 136-148 - Dileep Kumar Pattipati, Appala Naidu Tentu, V. Ch. Venkaiah:

Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structures. 149-161
Encryption and Cryptography
- Subhas Barman, Samiran Chattopadhyay

, Debasis Samanta:
An Approach to Cryptographic Key Exchange Using Fingerprint. 162-172 - Pankaj Kumar Sharma, Musheer Ahmad, Parvez Mahmood Khan:

Cryptanalysis of Image Encryption Algorithm Based on Pixel Shuffling and Chaotic S-box Transformation. 173-181 - Abhishek Kolazi, Sudhish N. George, P. P. Deepthi:

PWLCM Based Secure Measurement Matrix Generation for Secure Video Compressive Sensing. 182-191 - Ravi Kishore Kodali:

A Mathematical Analysis of Elliptic Curve Point Multiplication. 192-200
System and Network Security
- Harmeet Kaur Khanuja, Dattatraya S. Adane:

Forensic Analysis for Monitoring Database Transactions. 201-210 - Suash Deb, Simon Fong, Sabu M. Thampi

:
Framework of Lightweight Secure Media Transfer for Mobile Law Enforcement Apps. 211-220 - Richa Mahajan, Rahul Hans:

A Novel Comparison Based Approach for Fault Tolerance in Mobile Agent Systems. 221-229 - Ivy Prathap, R. Anitha:

Watermark Detection in Spatial and Transform Domains Based on Tree Structured Wavelet Transform. 230-238 - Vijayendra Grampurohit, Vijay Kumar, Sanjay Rawat, Shatrunjay Rawat:

Category Based Malware Detection for Android. 239-249 - Ankita Wadhawan

, Dinesh Kumar
:
Design and Analysis of Online Punjabi Signature Verification System Using Grid Optimization. 250-262 - T. R. Reshmi, Shiney Matilda Manoharan, Krishnan Murugan:

Internal Hardware States Based Privacy Extension of IPv6 Addresses. 263-271 - Rachit Adhvaryu

, Nikunj Domadiya:
An Improved EMHS Algorithm for Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database. 272-280 - Arti Dwivedi, Ashok Kumar Mittal, Suneet Dwivedi

:
Secure Communication Using Four-Wing Hyper-Chaotic Attractor. 281-290 - V. Srihari, R. Anitha Nadarajan:

DDoS Detection System Using Wavelet Features and Semi-supervised Learning. 291-303 - Pitchai MohanaPriya, V. Akilandeswari

, G. Akilarasu
, S. Mercy Shalinie
:
An Integrated Approach of E-RED and ANT Classification Methods for DRDoS Attacks. 304-312 - Celine Mary Stuart, Deepthi P. Pattathil:

Low Complex System for Physical Layer Security Using NLFG and QCLDPC Code. 313-324
Work-in-Progress
- Vikash Kumar Rai

, Arun Mishra
:
Authentication of Trusted Platform Module Using Processor Response. 325-334 - Kanakkath Praveen, M. Sethumadhavan:

Results on (2, n) Visual Cryptographic Scheme. 335-340 - Digambar Povar

, G. Geethakumari:
A Heuristic Model for Performing Digital Forensics in Cloud Computing Environment. 341-352 - Monika Darji, Bhushan H. Trivedi:

Detection of Active Attacks on Wireless IMDs Using Proxy Device and Localization Information. 353-362 - Mukul Tiwari, Sumit Kumar

:
Vulnerability of MR-ARP in Prevention of ARP Poisoning and Solution. 363-369 - Deepak Sangroha, Vishal Gupta:

Analyzer Router: An Approach to Detect and Recover from OSPF Attacks. 370-378 - Ghanshyam S. Bopche, Babu M. Mehtre:

Attack Graph Generation, Visualization and Analysis: Issues and Challenges. 379-390 - Ishu Jain, Rahul Johari

, R. L. Ujjwal:
CAVEAT: Credit Card Vulnerability Exhibition and Authentication Tool. 391-399 - Jignesh C. Doshi, Maxwell Christian, Bhushan H. Trivedi:

SQL FILTER - SQL Injection Prevention and Logging Using Dynamic Network Filter. 400-406 - Shivani Sharma, Virendra Kumar Yadav, Saumya Batham:

Zero Distortion Technique: An Approach to Image Steganography Using Strength of Indexed Based Chaotic Sequence. 407-416 - Jitendra Lulla, Varsha Sharma:

Piracy Control Using Secure Disks. 417-430 - Gopinath V., Bhuvaneswaran R. S.:

Design of Security System of Portable Device: Securing XML Web Services with ECC. 431-439

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














