


default search action
SSCC 2015: Kochi, India
- Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi

, Antonio Ruiz-Martínez
:
Security in Computing and Communications - Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings. Communications in Computer and Information Science 536, Springer 2015, ISBN 978-3-319-22914-0
Security in Cloud Computing
- Dapeng Xiong, Peng Zou, Jun Cai, Jun He:

A Dynamic Multi-domain Access Control Model in Cloud Computing. 3-12 - Doyel Pal, Praveenkumar Khethavath, Johnson P. Thomas, Tingting Chen:

Multilevel Threshold Secret Sharing in Distributed Cloud. 13-23 - Deepnarayan Tiwari, G. R. Gangadharan

:
Secure Sharing of Data in Cloud Computing. 24-35 - Naveen Kumar, Anish Mathuria, Manik Lal Das:

Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud. 36-44 - N. M. Dhanya

, G. Kousalya
:
Adaptive and Secure Application Partitioning for Offloading in Mobile Cloud Computing. 45-53 - Balasundaram Muthukumar

, Praveen Kumar Rajendran:
Intelligent Intrusion Detection System for Private Cloud Environment. 54-65 - Ronak Vyas, Alok Singh, Jolly Singh, Gunjan Soni, B. R. Purushothama

:
Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Computing. 66-77 - Sandeep Kakde

, Mithilesh Mahindra, Atish Khobragade, Nikit Shah:
FPGA Implementation of 128-Bit Fused Multiply Add Unit for Crypto Processors. 78-85
Authentication and Access Control Systems
- Quist-Aphetsi Kester

, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor:
A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images. 89-98 - Sarat Kumar Chettri

, Bhogeswar Borah
:
Anonymizing Classification Data for Preserving Privacy. 99-109 - Vimal Kumar

, Rakesh Kumar:
An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET. 110-121 - Byrapura Rangappa Purushothama

, B. B. Amberker:
Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme. 122-133 - Anup Kumar Maurya

, V. N. Sastry, Siba Kumar Udgata
:
Cryptanalysis and Improvement of ECC - Based Security Enhanced User Authentication Protocol for Wireless Sensor Networks. 134-145 - Doyel Pal, Praveenkumar Khethavath, Johnson P. Thomas, Tingting Chen:

Secure and Privacy Preserving Biometric Authentication Using Watermarking Technique. 146-156 - A. Athira Ram, T. S. Jyothis:

Reducing Vulnerability of a Fingerprint Authentication System. 157-167 - Nazneen Akhter, Hanumant R. Gite

, Gulam Rabbani, Karbhari V. Kale
:
Heart Rate Variability for Biometric Authentication Using Time-Domain Features. 168-175 - Chandra Mouliswaran Subramanian, Aswani Kumar Cherukuri, Chandrasekar Chelliah:

Modeling Fuzzy Role Based Access Control Using Fuzzy Formal Concept Analysis. 176-185 - Y. Prashanth Reddy, Kamlesh Tiwari, Vandana Dixit Kaushik, Phalguni Gupta:

An Efficient Fingerprint Minutiae Detection Algorithm. 186-194
Cryptography and Steganography
- Ravi Gupta, Rahul Kumar Singh:

An Improved Substitution Method for Data Encryption Using DNA Sequence and CDMB. 197-206 - Santhanalakshmi S

, K. Sangeeta
, Gopal K. Patra:
Analysis of Neural Synchronization Using Genetic Approach for Secure Key Generation. 207-216 - Laukendra Singh, Rahul Johari

:
CLCT: Cross Language Cipher Technique. 217-227 - Quist-Aphetsi Kester

, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor:
A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images. 228-237 - P. Devaraj, C. Kavitha:

A Coupled Chaos Based Image Encryption Scheme Using Bit Level Diffusion. 238-246 - M. Sundari, P. B. Revathi, S. Sumesh:

Secure Communication Using Digital Watermarking with Encrypted Text Hidden in an Image. 247-255 - M. Suchithra

, O. K. Sikha
:
A Novel Image Encryption Scheme Using an Irrevocable Multimodal Biometric Key. 256-264 - Sachin Hosmani, H. G. Rama Bhat, K. Chandrasekaran

:
Dual Stage Text Steganography Using Unicode Homoglyphs. 265-276 - Greeshma Sarath

, R. Jayapriya:
Securing Database Server Using Homomorphic Encryption and Re-encryption. 277-289 - Sudhanshu Suhas Gonge

, Ashok A. Ghatol:
A Robust and Secure DWT-SVD Digital Image Watermarking Using Encrypted Watermark for Copyright Protection of Cheque Image. 290-303
System and Network Security
- J. Arunnehru

, M. Kalaiselvi Geetha
, T. Nanthini:
Occlusion Detection Based on Fractal Texture Analysis in Surveillance Videos Using Tree-Based Classifiers. 307-316 - R. Kamatchi, Kanika Minocha:

A Modus Operandi for Social Networking Security Solutions Based on Varied Usages. 317-328 - Pradeep Kr. Banerjee:

A Secret Common Information Duality for Tripartite Noisy Correlations. 329-341 - Ghanshyam S. Bopche

, Babu M. Mehtre:
Exploiting Domination in Attack Graph for Enterprise Network Hardening. 342-353 - Anirban Sengupta

:
Modeling Dependencies of ISO/IEC 27002: 2013 Security Controls. 354-367 - Sohini Roy:

Secure Cluster Based Routing Scheme (SCBRS) for Wireless Sensor Networks. 368-380 - PL. Rajarajeswari, N. K. Karthikeyan:

A Pareto Survivor Function Based Cluster Head Selection Mechanism (PSFCHSM) to Mitigate Selfish Nodes in Wireless Sensor Networks. 381-391 - R. Sathya, M. Kalaiselvi Geetha

, P. Aboorvapriya:
Vehicle Brake and Indicator Detection for Autonomous Vehicles. 392-401 - Jeril Kuriakose

, V. Amruth, R. Vikram Raju
:
Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks. 402-411 - J. Arunnehru

, M. Kalaiselvi Geetha
:
Human Activity Recognition Based on Motion Projection Profile Features in Surveillance Videos Using Support Vector Machines and Gaussian Mixture Models. 412-423 - Venkatasamy Sureshkumar

, Anitha Ramalingam, S. Anandhi:
Analysis of Accountability Property in Payment Systems Using Strand Space Model. 424-437 - Tarun Yadav

, Arvind Mallari Rao:
Technical Aspects of Cyber Kill Chain. 438-452
Application Security
- Kanubhai K. Patel

, Bharat Buddadev:
Detection and Mitigation of Android Malware Through Hybrid Approach. 455-463 - R. Bharath, G. Arun Sabari, Dhinesh Ravi Krishna, Arun Prasathe, K. Harish, N. Mohankumar

, M. Nirmala Devi
:
Malicious Circuit Detection for Improved Hardware Security. 464-472 - Rohit Sharma, Upasna Singh

:
Framework for Live Forensics of a System by Extraction of Clipboard Data and Other Forensic Artefacts from RAM Image. 473-482 - Goverdhan Reddy Jidiga, Porika Sammulal:

Anomaly Detection Through Comparison of Heterogeneous Machine Learning Classifiers vs KPCA. 483-495 - Pradeep Kumar Tiwari

, Upasna Singh
:
Android Users Security via Permission Based Analysis. 496-505 - Md. Imran Alam, Raju Halder:

Data-Centric Refinement of Information Flow Analysis of Database Applications. 506-518 - Eknadh Vaddi, Karthik Gaddam, Rahul Karthik Maniam, Sai Abhishek Mallavajjala, Srinivasulu Dasari, M. Nirmala Devi

:
Detection and Diagnosis of Hardware Trojan Using Power Analysis. 519-529 - Jamsheed K., K. Praveen:

A Low Overhead Prevention of Android WebView Abuse Attacks. 530-537 - Swathy Joseph, K. P. Jevitha:

An Automata Based Approach for the Prevention of NoSQL Injections. 538-546

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














