


default search action
SSCC 2017: Manipal, India
- Sabu M. Thampi, Gregorio Martínez Pérez, Carlos Becker Westphall, Jiankun Hu, Chun I. Fan, Félix Gómez Mármol:

Security in Computing and Communications - 5th International Symposium, SSCC 2017, Manipal, India, September 13-16, 2017, Proceedings. Communications in Computer and Information Science 746, Springer 2017, ISBN 978-981-10-6897-3 - M. Akhil Jabbar

, Ghanshyam S. Bopche
, Bulusu Lakshmana Deekshatulu, Babu M. Mehtre:
Diversity-aware, Cost-effective Network Security Hardening Using Attack Graph. 1-15 - Apurva S. Kittur, Ashu Jain, Alwyn Roshan Pais

:
Fast Verification of Digital Signatures in IoT. 16-27 - N. B. Gayathri

, R. R. V. Krishna Rao, Punugu Vasudeva Reddy:
Efficient and Provably Secure Pairing Free ID-Based Directed Signature Scheme. 28-38 - Anup Kumar Maurya, V. N. Sastry:

User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition. 39-53 - Ramesh Kalpika, A. R. Vasudevan

:
Detection of Zeus Bot Based on Host and Network Activities. 54-64 - Sandipan Biswas

, Pampa Sadhukhan
, Sarmistha Neogy:
An Asymmetric Key Based Efficient Authentication Mechanism for Proxy Mobile IPv6 Networks. 65-78 - Anup Kumar Maurya, V. N. Sastry:

User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem. 79-94 - Sarvesh V. Sawant

, Gaurav Pareek, B. R. Purushothama
:
A Ringer-Based Throttling Approach to Mitigate DDoS Attacks. 95-108 - Divya Chaudhary, Bijendra Kumar

, Rahul Khanna:
NPSO Based Cost Optimization for Load Scheduling in Cloud Computing. 109-121 - Alok Kumar

, Alwyn Roshan Pais
:
Multi-sink En-Route Filtering Mechanism for Wireless Sensor Networks. 122-133 - Amit Mali, Anant V. Nimkar

:
Security Schemes for Constrained Application Protocol in IoT: A Precise Survey. 134-145 - R. Krithika, Ashok Kumar Mohan

, M. Sethumadhavan
:
Jordan Center Segregation: Rumors in Social Media Networks. 146-158 - T. Nathezhtha, Vaidehi V.:

Honeyword with Salt-Chlorine Generator to Enhance Security of Cloud User Credentials. 159-169 - Manjula C. Belavagi

, Balachandra Muniyal:
Multi Class Machine Learning Algorithms for Intrusion Detection - A Performance Study. 170-178 - Bruhadeshwar Bezawada

, Kishore Kothapalli, Raman Dugyala
, Rui Li:
Symmetric Key Based Secure Resource Sharing. 179-194 - K. R. Atul, K. P. Jevitha:

Prevention of PAC File Based Attack Using DHCP Snooping. 195-204 - S. Lakshmi, Chungath Srinivasan, K. V. Lakshmy

, M. Sindhu:
A Quasigroup Based Synchronous Stream Cipher for Lightweight Applications. 205-214 - B. R. Purushothama

, Arun Prakash Verma, Abhilash Kumar:
Security Analysis of Key Management Schemes Based on Chinese Remainder Theorem Under Strong Active Outsider Adversary Model. 215-225 - R. K. Rahul, Anjali T, Vijay Krishna Menon

, K. P. Soman
:
Deep Learning for Network Flow Analysis and Malware Classification. 226-235 - Ajay Anto, Routhu Srinivasa Rao

, Alwyn Roshan Pais
:
Kernel Modification APT Attack Detection in Android. 236-249 - R. Krishna Ram Prakash, P. P. Amritha, M. Sethumadhavan

:
Opaque Predicate Detection by Static Analysis of Binary Executables. 250-258 - Yassine Lemmou

, El Mamoun Souidi
:
An Overview on Spora Ransomware. 259-275 - Annu Roy, J. P. Anita

:
Pattern Generation and Test Compression Using PRESTO Generator. 276-285 - Sudip Hazra, Prabhaker Mateti:

Challenges in Android Forensics. 286-299 - William P. Maia, Edward D. Moreno:

Current Consumption Analysis of AES and PRESENT Encryption Algorithms in FPGA Using the Welch Method. 300-311 - Suvarna Kothari, Hitesh Hasija:

Spiral Model for Digital Forensics Investigation. 312-324 - Chaitanya Bapat, Ganesh Baleri, Shivani Inamdar, Anant V. Nimkar

:
Smart-Lock Security Re-engineered Using Cryptography and Steganography. 325-336 - Karthik M. Rao, P. S. Aiyyappan, Prabhaker Mateti:

Adding Continuous Proactive Forensics to Android. 337-349 - Vivek Parikh, Prabhaker Mateti:

ASLR and ROP Attack Mitigations for ARM-Based Android Devices. 350-363 - Sudakshina Singha Roy, K. P. Jevitha:

CBEAT: Chrome Browser Extension Analysis Tool. 364-378 - K. Atchuta Sashank, Hari Sivarami Reddy, P. Pavithran, M. S. Akash, M. Nirmala Devi

:
Hardware Trojan Detection Using Effective Test Patterns and Selective Segmentation. 379-386 - J. Ramnarayan, J. P. Anita

, P. Sudheesh:
Estimation and Tracking of a Ballistic Target Using Sequential Importance Sampling Method. 387-398 - Kanakkath Praveen, G. Indu, R. Santhya, M. Sethumadhavan

:
An Android Application for Secret Image Sharing with Cloud Storage. 399-410 - M. Nishanth, J. P. Anita

, P. Sudheesh:
Tracking of GPS Parameters Using Particle Filter. 411-421

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














