


default search action
SSCC 2016: Jaipur, India
- Peter Müller, Sabu M. Thampi, Md. Zakirul Alam Bhuiyan, Ryan Kok Leong Ko

, Robin Doss, José M. Alcaraz Calero
:
Security in Computing and Communications - 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings. Communications in Computer and Information Science 625, Springer 2016, ISBN 978-981-10-2737-6
Cryptosystems, Algorithms, Primitives
- Mark A. Will, Ryan K. L. Ko

:
Computing Mod with a Variable Lookup Table. 3-17 - Asha Liza John, Sabu M. Thampi

:
Mutual Authentication Based on HECC for RFID Implant Systems. 18-29 - Biswanath Sethi, Sukanta Das:

On the Use of Asynchronous Cellular Automata in Symmetric-Key Cryptography. 30-41 - Inderjeet Singh, Alwyn R. Pais

:
A Random Key Generation Scheme Using Primitive Polynomials over GF(2). 42-51 - P. Sanyasi Naidu

, Reena Kharat
:
Multi-factor Authentication Using Recursive XOR-Based Visual Cryptography in Online Voting System. 52-62 - Anurag Singh Tomar, Shashi Kant Shankar

, Manmohan Sharma, Aditya Bakshi:
Enhanced Image Based Authentication with Secure Key Exchange Mechanism Using ECC in Cloud. 63-73 - Prakash Dey, Raghvendra Singh Rohit, Santanu Sarkar

, Avishek Adhikari:
Differential Fault Analysis on Tiaoxin and AEGIS Family of Ciphers. 74-86 - Rajeev Sobti, G. Geetha

:
A Comparison of Diffusion Properties of Salsa, ChaCha, and MCC Core. 87-98 - Kulvaibhav Kaushik, Vijayaraghavan Varadharajan:

A Secure Keyword Ordered Multiuser Searchable Encryption Framework. 99-111 - Prakhar Jain, K. K. Shukla

:
Cryptographic Assessment of SSL/TLS Servers Popular in India. 112-123 - Bhavya Ishaan Murmu, Anu Kumari, Manu Malkani, Sanjeet Kumar

:
Key Identifications Using Hebbian Learning. 124-133
Security and Privacy in Networked Systems
- Srijita Basu, Anirban Sengupta

, Chandan Mazumdar:
An Automated Methodology for Secured User Allocation in Cloud. 137-151 - Anu Mary Chacko

, Munavar Fairooz, S. D. Madhu Kumar
:
Provenance-Aware NoSQL Databases. 152-160 - Sumit Saurabh, Alwyn R. Pais

, Sumanta Chatterjee:
Efficient Key Management in IoT Using Mobile Aggregator. 161-172 - Parampreet Singh, Pankaj Deep Kaur

:
Cloud Resources Optimization for Air Pollution Monitoring Devices and Avoiding Post Pillar Problem. 173-187 - Himanshi Agrawal, Rishabh Kaushal

:
Credibility Assessment of Public Pages over Facebook. 188-198 - V. Thangam, K. Chandrasekaran

:
Elliptic Curve Based Secure Outsourced Computation in Multi-party Cloud Environment. 199-212 - Doyel Pal, Gobinda Senchury, Praveenkumar Khethavath:

Secure and Privacy Preserving Mobile Healthcare Data Exchange Using Cloud Service. 213-224 - N. B. Gayathri

, Punugu Vasudeva Reddy:
Secure Certificateless Signature Scheme with Batch Verification from Bilinear Pairings. 225-235
System and Network Security
- Rajat Goel

, Mahesh Chandra Govil, Girdhari Singh
:
Security Requirements Elicitation and Modeling Authorizations. 239-250 - Anjana Gosain, Amar Arora

:
Two Level Signature Based Authorization Model for Secure Data Warehouse. 251-257 - S. Vikranth, P. Sudheesh, M. Jayakumar

:
Nonlinear Tracking of Target Submarine Using Extended Kalman Filter (EKF). 258-268 - T. S. Gokkul Nath, P. Sudheesh, M. Jayakumar

:
Tracking Inbound Enemy Missile for Interception from Target Aircraft Using Extended Kalman Filter. 269-279
Steganography/Visual Cryptography/Image Forensics
- Maitreya Maity

, Dhiraj Manohar Dhane
, Tushar Mungle
, Rupak Chakraborty, Vasant Deokamble, Chandan Chakraborty:
A Secure One-Time Password Authentication Scheme Using Image Texture Features. 283-294 - Bagga Amandeep, G. Geetha

:
Analyzing the Applicability of Bitsum Algorithm on LSB Steganography Technique. 295-304 - Ankit Rajpal

, Anurag Mishra, Rajni Bala:
Extreme Learning Machine for Semi-blind Grayscale Image Watermarking in DWT Domain. 305-317 - Mandeep Kaur, Savita Gupta

:
A Passive Blind Approach for Image Splicing Detection Based on DWT and LBP Histograms. 318-327 - Ashwini Malviya

, Siddharth A. Ladhake:
An Image Forensic Technique for Detection of Copy-Move Forgery in Digital Image. 328-335 - P. Sanyasi Naidu

, Reena Kharat
:
Secure Authentication in Online Voting System Using Multiple Image Secret Sharing. 336-343
Applications Security
- Sohini Roy, Arvind Kumar Shah, Uma Bhattacharya

:
Touch and Track: An Anti-theft and Data Protection Technique for Smartphones. 347-357 - Tarik A. Rashid

, Salwa O. Mohamad:
Enhancement of Detecting Wicked Website Through Intelligent Methods. 358-368 - B. Ashwini, Vijay Krishna Menon

, K. P. Soman
:
Prediction of Malicious Domains Using Smith Waterman Algorithm. 369-376 - Chandrasekhar Kuruba, Kethzi Gilbert, Prabhav Sidhaye, Gaurav Pareek, Byrapura Rangappa Purushothama:

Outsource-Secured Calculation of Closest Pair of Points. 377-389 - Aditya Chandran, Lokesh Jain, Sanjay Rawat

, Kannan Srinathan:
Discovering Vulnerable Functions: A Code Similarity Based Approach. 390-402 - Komal Pawar, Tanuja Dhope:

Performance Analysis of Spectrum Sensing Algorithm Using Multiple Antenna in Cognitive Radio. 403-413 - T. S. Gokkul Nath, E. R. Midhila, Ashwin Swaminathan, Binitaa Lekshmi, J. P. Anita

:
Diagnosis of Multiple Stuck-at Faults Using Fault Element Graph with Reduced Power. 414-426 - Shubha Puthran

, Ketan Shah
:
Intrusion Detection Using Improved Decision Tree Algorithm with Binary and Quad Split. 427-438 - Surendran K, Prabaharan Poornachandran

, Aravind Ashok Nair, Srinath N, Ysudhir Kumar, P. Hrudya:
MalJs: Lexical, Structural and Behavioral Analysis of Malicious JavaScripts Using Ensemble Classifier. 439-449 - Madhuri Dewangan, Rishabh Kaushal

:
SocialBot: Behavioral Analysis and Detection. 450-460 - Sugandha Gupta, Rishabh Kaushal

:
Vulnebdroid: Automated Vulnerability Score Calculator for Android Applications. 461-471

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














