default search action
SSCC 2016: Jaipur, India
- Peter Müller, Sabu M. Thampi, Md. Zakirul Alam Bhuiyan, Ryan Kok Leong Ko, Robin Doss, José M. Alcaraz Calero:
Security in Computing and Communications - 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings. Communications in Computer and Information Science 625, Springer 2016, ISBN 978-981-10-2737-6
Cryptosystems, Algorithms, Primitives
- Mark A. Will, Ryan K. L. Ko:
Computing Mod with a Variable Lookup Table. 3-17 - Asha Liza John, Sabu M. Thampi:
Mutual Authentication Based on HECC for RFID Implant Systems. 18-29 - Biswanath Sethi, Sukanta Das:
On the Use of Asynchronous Cellular Automata in Symmetric-Key Cryptography. 30-41 - Inderjeet Singh, Alwyn R. Pais:
A Random Key Generation Scheme Using Primitive Polynomials over GF(2). 42-51 - P. Sanyasi Naidu, Reena Kharat:
Multi-factor Authentication Using Recursive XOR-Based Visual Cryptography in Online Voting System. 52-62 - Anurag Singh Tomar, Shashi Kant Shankar, Manmohan Sharma, Aditya Bakshi:
Enhanced Image Based Authentication with Secure Key Exchange Mechanism Using ECC in Cloud. 63-73 - Prakash Dey, Raghvendra Singh Rohit, Santanu Sarkar, Avishek Adhikari:
Differential Fault Analysis on Tiaoxin and AEGIS Family of Ciphers. 74-86 - Rajeev Sobti, G. Geetha:
A Comparison of Diffusion Properties of Salsa, ChaCha, and MCC Core. 87-98 - Kulvaibhav Kaushik, Vijayaraghavan Varadharajan:
A Secure Keyword Ordered Multiuser Searchable Encryption Framework. 99-111 - Prakhar Jain, K. K. Shukla:
Cryptographic Assessment of SSL/TLS Servers Popular in India. 112-123 - Bhavya Ishaan Murmu, Anu Kumari, Manu Malkani, Sanjeet Kumar:
Key Identifications Using Hebbian Learning. 124-133
Security and Privacy in Networked Systems
- Srijita Basu, Anirban Sengupta, Chandan Mazumdar:
An Automated Methodology for Secured User Allocation in Cloud. 137-151 - Anu Mary Chacko, Munavar Fairooz, S. D. Madhu Kumar:
Provenance-Aware NoSQL Databases. 152-160 - Sumit Saurabh, Alwyn R. Pais, Sumanta Chatterjee:
Efficient Key Management in IoT Using Mobile Aggregator. 161-172 - Parampreet Singh, Pankaj Deep Kaur:
Cloud Resources Optimization for Air Pollution Monitoring Devices and Avoiding Post Pillar Problem. 173-187 - Himanshi Agrawal, Rishabh Kaushal:
Credibility Assessment of Public Pages over Facebook. 188-198 - V. Thangam, K. Chandrasekaran:
Elliptic Curve Based Secure Outsourced Computation in Multi-party Cloud Environment. 199-212 - Doyel Pal, Gobinda Senchury, Praveenkumar Khethavath:
Secure and Privacy Preserving Mobile Healthcare Data Exchange Using Cloud Service. 213-224 - N. B. Gayathri, Punugu Vasudeva Reddy:
Secure Certificateless Signature Scheme with Batch Verification from Bilinear Pairings. 225-235
System and Network Security
- Rajat Goel, Mahesh Chandra Govil, Girdhari Singh:
Security Requirements Elicitation and Modeling Authorizations. 239-250 - Anjana Gosain, Amar Arora:
Two Level Signature Based Authorization Model for Secure Data Warehouse. 251-257 - S. Vikranth, P. Sudheesh, M. Jayakumar:
Nonlinear Tracking of Target Submarine Using Extended Kalman Filter (EKF). 258-268 - T. S. Gokkul Nath, P. Sudheesh, M. Jayakumar:
Tracking Inbound Enemy Missile for Interception from Target Aircraft Using Extended Kalman Filter. 269-279
Steganography/Visual Cryptography/Image Forensics
- Maitreya Maity, Dhiraj Manohar Dhane, Tushar Mungle, Rupak Chakraborty, Vasant Deokamble, Chandan Chakraborty:
A Secure One-Time Password Authentication Scheme Using Image Texture Features. 283-294 - Bagga Amandeep, G. Geetha:
Analyzing the Applicability of Bitsum Algorithm on LSB Steganography Technique. 295-304 - Ankit Rajpal, Anurag Mishra, Rajni Bala:
Extreme Learning Machine for Semi-blind Grayscale Image Watermarking in DWT Domain. 305-317 - Mandeep Kaur, Savita Gupta:
A Passive Blind Approach for Image Splicing Detection Based on DWT and LBP Histograms. 318-327 - Ashwini Malviya, Siddharth A. Ladhake:
An Image Forensic Technique for Detection of Copy-Move Forgery in Digital Image. 328-335 - P. Sanyasi Naidu, Reena Kharat:
Secure Authentication in Online Voting System Using Multiple Image Secret Sharing. 336-343
Applications Security
- Sohini Roy, Arvind Kumar Shah, Uma Bhattacharya:
Touch and Track: An Anti-theft and Data Protection Technique for Smartphones. 347-357 - Tarik A. Rashid, Salwa O. Mohamad:
Enhancement of Detecting Wicked Website Through Intelligent Methods. 358-368 - B. Ashwini, Vijay Krishna Menon, K. P. Soman:
Prediction of Malicious Domains Using Smith Waterman Algorithm. 369-376 - Chandrasekhar Kuruba, Kethzi Gilbert, Prabhav Sidhaye, Gaurav Pareek, Byrapura Rangappa Purushothama:
Outsource-Secured Calculation of Closest Pair of Points. 377-389 - Aditya Chandran, Lokesh Jain, Sanjay Rawat, Kannan Srinathan:
Discovering Vulnerable Functions: A Code Similarity Based Approach. 390-402 - Komal Pawar, Tanuja Dhope:
Performance Analysis of Spectrum Sensing Algorithm Using Multiple Antenna in Cognitive Radio. 403-413 - T. S. Gokkul Nath, E. R. Midhila, Ashwin Swaminathan, Binitaa Lekshmi, J. P. Anita:
Diagnosis of Multiple Stuck-at Faults Using Fault Element Graph with Reduced Power. 414-426 - Shubha Puthran, Ketan Shah:
Intrusion Detection Using Improved Decision Tree Algorithm with Binary and Quad Split. 427-438 - Surendran K, Prabaharan Poornachandran, Aravind Ashok Nair, Srinath N, Ysudhir Kumar, P. Hrudya:
MalJs: Lexical, Structural and Behavioral Analysis of Malicious JavaScripts Using Ensemble Classifier. 439-449 - Madhuri Dewangan, Rishabh Kaushal:
SocialBot: Behavioral Analysis and Detection. 450-460 - Sugandha Gupta, Rishabh Kaushal:
Vulnebdroid: Automated Vulnerability Score Calculator for Android Applications. 461-471
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.