


default search action
SSCC 2015: Kochi, India
- Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi
, Antonio Ruiz-Martínez
:
Security in Computing and Communications - Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings. Communications in Computer and Information Science 536, Springer 2015, ISBN 978-3-319-22914-0
Security in Cloud Computing
- Dapeng Xiong, Peng Zou, Jun Cai, Jun He:
A Dynamic Multi-domain Access Control Model in Cloud Computing. 3-12 - Doyel Pal, Praveenkumar Khethavath, Johnson P. Thomas, Tingting Chen:
Multilevel Threshold Secret Sharing in Distributed Cloud. 13-23 - Deepnarayan Tiwari, G. R. Gangadharan
:
Secure Sharing of Data in Cloud Computing. 24-35 - Naveen Kumar, Anish Mathuria, Manik Lal Das:
Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud. 36-44 - N. M. Dhanya
, G. Kousalya:
Adaptive and Secure Application Partitioning for Offloading in Mobile Cloud Computing. 45-53 - Balasundaram Muthukumar
, Praveen Kumar Rajendran:
Intelligent Intrusion Detection System for Private Cloud Environment. 54-65 - Ronak Vyas, Alok Singh, Jolly Singh, Gunjan Soni, B. R. Purushothama
:
Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Computing. 66-77 - Sandeep Kakde
, Mithilesh Mahindra, Atish Khobragade, Nikit Shah:
FPGA Implementation of 128-Bit Fused Multiply Add Unit for Crypto Processors. 78-85
Authentication and Access Control Systems
- Quist-Aphetsi Kester
, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor:
A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images. 89-98 - Sarat Kumar Chettri
, Bhogeswar Borah
:
Anonymizing Classification Data for Preserving Privacy. 99-109 - Vimal Kumar
, Rakesh Kumar:
An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET. 110-121 - Byrapura Rangappa Purushothama
, B. B. Amberker:
Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme. 122-133 - Anup Kumar Maurya
, V. N. Sastry, Siba Kumar Udgata
:
Cryptanalysis and Improvement of ECC - Based Security Enhanced User Authentication Protocol for Wireless Sensor Networks. 134-145 - Doyel Pal, Praveenkumar Khethavath, Johnson P. Thomas, Tingting Chen:
Secure and Privacy Preserving Biometric Authentication Using Watermarking Technique. 146-156 - A. Athira Ram, T. S. Jyothis:
Reducing Vulnerability of a Fingerprint Authentication System. 157-167 - Nazneen Akhter, Hanumant R. Gite
, Gulam Rabbani, Karbhari V. Kale
:
Heart Rate Variability for Biometric Authentication Using Time-Domain Features. 168-175 - Chandra Mouliswaran Subramanian, Aswani Kumar Cherukuri, Chandrasekar Chelliah:
Modeling Fuzzy Role Based Access Control Using Fuzzy Formal Concept Analysis. 176-185 - Y. Prashanth Reddy, Kamlesh Tiwari, Vandana Dixit Kaushik, Phalguni Gupta:
An Efficient Fingerprint Minutiae Detection Algorithm. 186-194
Cryptography and Steganography
- Ravi Gupta, Rahul Kumar Singh:
An Improved Substitution Method for Data Encryption Using DNA Sequence and CDMB. 197-206 - S. Santhanalakshmi
, K. Sangeeta
, Gopal K. Patra:
Analysis of Neural Synchronization Using Genetic Approach for Secure Key Generation. 207-216 - Laukendra Singh, Rahul Johari
:
CLCT: Cross Language Cipher Technique. 217-227 - Quist-Aphetsi Kester
, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor:
A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images. 228-237 - P. Devaraj, C. Kavitha:
A Coupled Chaos Based Image Encryption Scheme Using Bit Level Diffusion. 238-246 - M. Sundari, P. B. Revathi, S. Sumesh:
Secure Communication Using Digital Watermarking with Encrypted Text Hidden in an Image. 247-255 - M. Suchithra
, O. K. Sikha
:
A Novel Image Encryption Scheme Using an Irrevocable Multimodal Biometric Key. 256-264 - Sachin Hosmani, H. G. Rama Bhat, K. Chandrasekaran
:
Dual Stage Text Steganography Using Unicode Homoglyphs. 265-276 - Greeshma Sarath
, R. Jayapriya:
Securing Database Server Using Homomorphic Encryption and Re-encryption. 277-289 - Sudhanshu Suhas Gonge
, Ashok A. Ghatol:
A Robust and Secure DWT-SVD Digital Image Watermarking Using Encrypted Watermark for Copyright Protection of Cheque Image. 290-303
System and Network Security
- J. Arunnehru
, M. Kalaiselvi Geetha
, T. Nanthini:
Occlusion Detection Based on Fractal Texture Analysis in Surveillance Videos Using Tree-Based Classifiers. 307-316 - R. Kamatchi, Kanika Minocha:
A Modus Operandi for Social Networking Security Solutions Based on Varied Usages. 317-328 - Pradeep Kr. Banerjee:
A Secret Common Information Duality for Tripartite Noisy Correlations. 329-341 - Ghanshyam S. Bopche
, Babu M. Mehtre:
Exploiting Domination in Attack Graph for Enterprise Network Hardening. 342-353 - Anirban Sengupta
:
Modeling Dependencies of ISO/IEC 27002: 2013 Security Controls. 354-367 - Sohini Roy:
Secure Cluster Based Routing Scheme (SCBRS) for Wireless Sensor Networks. 368-380 - PL. Rajarajeswari, N. K. Karthikeyan:
A Pareto Survivor Function Based Cluster Head Selection Mechanism (PSFCHSM) to Mitigate Selfish Nodes in Wireless Sensor Networks. 381-391 - R. Sathya, M. Kalaiselvi Geetha
, P. Aboorvapriya:
Vehicle Brake and Indicator Detection for Autonomous Vehicles. 392-401 - Jeril Kuriakose
, V. Amruth, R. Vikram Raju
:
Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks. 402-411 - J. Arunnehru
, M. Kalaiselvi Geetha
:
Human Activity Recognition Based on Motion Projection Profile Features in Surveillance Videos Using Support Vector Machines and Gaussian Mixture Models. 412-423 - Venkatasamy Sureshkumar
, Anitha Ramalingam, S. Anandhi:
Analysis of Accountability Property in Payment Systems Using Strand Space Model. 424-437 - Tarun Yadav
, Arvind Mallari Rao:
Technical Aspects of Cyber Kill Chain. 438-452
Application Security
- Kanubhai K. Patel
, Bharat Buddadev:
Detection and Mitigation of Android Malware Through Hybrid Approach. 455-463 - R. Bharath, G. Arun Sabari, Dhinesh Ravi Krishna, Arun Prasathe, K. Harish, N. Mohankumar
, M. Nirmala Devi
:
Malicious Circuit Detection for Improved Hardware Security. 464-472 - Rohit Sharma, Upasna Singh
:
Framework for Live Forensics of a System by Extraction of Clipboard Data and Other Forensic Artefacts from RAM Image. 473-482 - Goverdhan Reddy Jidiga, Porika Sammulal:
Anomaly Detection Through Comparison of Heterogeneous Machine Learning Classifiers vs KPCA. 483-495 - Pradeep Kumar Tiwari
, Upasna Singh
:
Android Users Security via Permission Based Analysis. 496-505 - Md. Imran Alam, Raju Halder:
Data-Centric Refinement of Information Flow Analysis of Database Applications. 506-518 - Eknadh Vaddi, Karthik Gaddam, Rahul Karthik Maniam, Sai Abhishek Mallavajjala, Srinivasulu Dasari, M. Nirmala Devi
:
Detection and Diagnosis of Hardware Trojan Using Power Analysis. 519-529 - Jamsheed K., K. Praveen:
A Low Overhead Prevention of Android WebView Abuse Attacks. 530-537 - Swathy Joseph, K. P. Jevitha:
An Automata Based Approach for the Prevention of NoSQL Injections. 538-546

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.