default search action
SNDS 2012, Trivandrum, India
- Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, José M. Alcaraz Calero, Tony Thomas:
Recent Trends in Computer Networks and Distributed Systems Security - International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings. Communications in Computer and Information Science 335, Springer 2012, ISBN 978-3-642-34134-2
Regular Papers
- Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials. 1-10 - B. R. Purushothama, Bharat Amberker:
Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation. 11-22 - Nelcileno Araújo, Ruy de Oliveira, Ed Wilson Tavares Ferreira, Valtemir Nascimento, Ailton Akira Shinoda, Bharat K. Bhargava:
Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection. 23-34 - Prashant Kumar Mishra, Kunwar Singh, Sudhanshu Baruntar:
ID-Based Threshold Signcryption and Group Unsigncryption. 35-44 - Manjunath Mattam:
Protocol for Secure Submissions into Learning Management Systems. 45-53 - Monika Darji, Bhushan Trivedi:
Secure Leader Election Algorithm Optimized for Power Saving Using Mobile Agents for Intrusion Detection in MANET. 54-63 - Somanath Tripathy, Debasish Sahoo:
WAKE: Authentication and Key Establishment for Wireless Mesh Network. 64-74 - Jinu Elizabeth John, A. S. Remya Ajai, Prabaharan Poornachandran:
Effective Implementation of DES Algorithm for Voice Scrambling. 75-84 - Amine Abidi, Ghazi Ben Ayed, Farouk Kamoun:
Towards Constructing a Trustworthy Internet: Privacy-Aware Transfer of Digital Identity Document in Content Centric Internetworking. 85-96 - Anjali Avinash Chandavale, Ashok M. Sapkal:
Security Analysis of CAPTCHA. 97-109 - Abraham Jobin, Paul Varghese:
Imperceptible Image Indexing Using Digital Watermarking. 110-116 - Srikumar Manghat:
A New Deterministic Algorithm for Testing Primality Based on a New Property of Prime Numbers. 117-126 - B. G. Nagaraja, Haradagere Siddaramaiah Jayanna:
Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCC. 127-134 - B. R. Purushothama, Kusuma Shirisha, Bharat Amberker:
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree. 135-146 - Ram Shringar Raw, Daya Krishan Lobiyal, Sanjoy Das:
An Analytical Approach to Position-Based Routing Protocol for Vehicular Ad Hoc Networks. 147-156 - V. Vasanthi, M. Hemalatha:
Simulation and Evaluation of Different Mobility Models in Ad-Hoc Sensor Network over DSR Protocol Using Bonnmotion Tool. 157-167 - Aravind Ashok, Prabaharan Poornachandran, Krishnashree Achuthan:
Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions. 168-177 - Lucas Rodrigo Raso Mattos, Vijayaraghavan Varadharajan, Rajarathnam Nallusamy:
Data Protection and Privacy Preservation Using Searchable Encryption on Outsourced Databases. 178-184 - Tiana Razafindralambo, Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet:
A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks. 185-194 - Enrico Cambiaso, Gianluca Papaleo, Maurizio Aiello:
Taxonomy of Slow DoS Attacks to Web Applications. 195-204 - Harshvardhan Tiwari, Ankit Luthra, Himanshu Goel, Sambhav Sharma, Krishna Asawa:
Crypto-Precision: Testing Tool for Hash Function. 205-214 - P. V. Sruthi, Prabaharan Poornachandran, A. S. Remya Ajai:
Performance Analysis and Improvement Using LFSR in the Pipelined Key Scheduling Section of DES. 215-224 - S. Dija, T. R. Deepthi, C. Balan, K. L. Thomas:
Towards Retrieving Live Forensic Artifacts in Offline Forensics. 225-233 - Balan Chelliah, Divya S. Vidyadharan, P. Shabana, K. L. Thomas:
Carving of Bitmap Files from Digital Evidences by Contiguous File Filtering. 234-239 - Adarsh Kumar, Alok Aggarwal:
Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks. 240-251 - S. Fouzul Hidhaya, Angelina Geetha:
Intrusion Protection against SQL Injection and Cross Site Scripting Attacks Using a Reverse Proxy. 252-263 - P. R. Mahalingam:
Three-Way Handshake-Based OTP Using Random Host-Side Keys for Effective Key Transfer in Symmetric Cryptosystems. 264-271 - Muthulakshmi Angamuthu, Anitha Ramalingam, S. Rohini, Krishnan Princy:
Identity Based Privacy Preserving Dynamic Broadcast Encryption for Multi-privileged Groups. 272-282 - Jerzy Konorski, Piotr Pacyna, Grzegorz Kolaczek, Zbigniew Kotulski, Krzysztof Cabaj, Pawel Szalachowski:
A Virtualization-Level Future Internet Defense-in-Depth Architecture. 283-292 - Stefan-Vladimir Ghita, Victor Valeriu Patriciu, Ion Bica:
Experimental DRM Model Using Mobile Code and White-Box Encryption. 293-303 - Dheerendra Mishra, Sourav Mukhopadhyay:
Towards a Secure, Transparent and Privacy-Preserving DRM System. 304-313 - M. T. Chitra, R. Priya, Elizabeth Sherly:
Time Based Constrained Object Identification in a Dynamic Social Network. 314-322 - Anjali Avinash Chandavale, Ashok M. Sapkal:
A New Approach towards Segmentation for Breaking CAPTCHA. 323-335 - Aman Jantan, Mohammad Rasmi, Mohd Izham Ibrahim, Azri H. A. Rahman:
A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network Forensics. 336-346
International Workshop on Security in Self-Organising Networks (SelfNet'12)
- Nilanjan Dey, Anamitra Bardhan Roy, Achintya Das, Sheli Sinha Chaudhuri:
Stationary Wavelet Transformation Based Self-recovery of Blind-Watermark from Electrocardiogram Signal in Wireless Telecardiology. 347-357 - Madhan Kumar Srinivasan, K. Sarukesi, Ashima Keshava, P. Revathy:
eCloudIDS - Design Roadmap for the Architecture of Next-Generation Hybrid Two-Tier Expert Engine-Based IDS for Cloud Computing Environment. 358-371 - Subhashis Banerjee, Koushik Majumder:
A Comparative Study on Wormhole Attack Prevention Schemes in Mobile Ad-Hoc Network. 372-384 - Philipp Digeser, Marco Tubolino, Martin Klemm, Axel Sikora:
Management of Routed Wireless M-Bus Networks for Sparsely Populated Large-Scale Smart-Metering Installations. 385-395 - Subhashis Banerjee, Koushik Majumder:
A Survey of Blackhole Attacks and Countermeasures in Wireless Mobile Ad-hoc Networks. 396-407
International Workshop on Intelligence and Security Informatics for International Security (IIS'12)
- Keerthi Balasundaram, Madhan Kumar Srinivasan, K. Sarukesi:
iReSign - Implementation of Next-Generation Two-Tier Identity Classifier-Based Traffic Sign Recognition System Architecture Using Hybrid Region-Based Shape Representation Techniques. 408-421
Work-in-Progress
- S. Santhanalakshmi, T. S. B. Sudarshan, Gopal K. Patra:
Neural Synchronization by Mutual Learning Using Genetic Approach for Secure Key Generation. 422-431 - Madhan Kumar Srinivasan, K. Sarukesi, Ashima Keshava, P. Revathy:
eCloudIDS Tier-1 uX-Engine Subsystem Design and Implementation Using Self-Organizing Map (SOM) for Secure Cloud Computing Environment. 432-443 - Ananya Chowdhury, Utpal Kumar Ray:
Implementation of MD6. 444-455 - Adapa Tataram, Alwyn Roshan Pais:
Location Estimation of Mobile in GSM and CDMA Networks. 456-465 - Deepa Krishnan, Madhumita Chatterjee:
An Adaptive Distributed Intrusion Detection System for Cloud Computing Framework. 466-473 - Praneet Saurabh, Bhupendra Verma, Sanjeev Kumar Sharma:
Biologically Inspired Computer Security System: The Way Ahead. 474-484 - Debajit Sensarma, Koushik Majumder:
A Comparative Analysis of the Ant Based Systems for QoS Routing in MANET. 485-496 - Nitin Goel, Shruti Sangwan, Ajay Jangra:
Efficient Weighted innovative Routing Protocol (EWiRP) to Balance Load in Mobile Ad Hoc Networks (MANETs): Simulation and Feasibility Analysis. 497-506
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.