Security in computing and communications : international symposium, SSCC 2013, Mysore, India, August 22-24, 2013 : proceedings /
Saved in:
Meeting name: | SSCC (Conference) (2013 : Mysore, India) |
---|---|
Imprint: | Heidelberg : Springer, [2013] ©2013 |
Description: | 1 online resource (xvi, 404 pages) : illustrations. |
Language: | English |
Series: | Communications in computer and information science, 1865-0929 ; 377 Communications in computer and information science ; 377. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11080615 |
Table of Contents:
- Regular Papers. A Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System / Sunil Malipatlolla
- Signature Embedding in the Functional Description of Reversible Circuit / Animesh Roy, Debasis Mitra
- Detecting Laser Fault Injection for Smart Cards Using Security Automata / Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet
- Virtual World Authentication Using the Smart Card Web Server / Lazaros Kyrillidis [and others]
- A More Efficient and Secure Authentication Scheme over Insecure Networks Using Smart Cards / Chandra Sekhar Vorugunti, Mrudula Sarvabhatla
- A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value Decomposition / G. Jyothish Lal, V.K. Veena, K.P. Soman
- Random Key and Key Dependent S-box Generation for AES Cipher to Overcome Known Attacks / L.N. Pradeep, Aniruddha Bhattacharjya.
- Emulating a High Interaction Honeypot to Monitor Intrusion Activity / Anil Gopalakrishna, Alwyn Rosham Pais
- On Pseudo-random Number Generation Using Elliptic Curve Cryptography / Manali Dubal, Aaradhana Deshmukh
- Exploiting Functional Models to Assess the Security Aspect in Embedded System Design / Ingo Stierand, Sunil Malipatlolla
- Design of CAPTCHA Script for Indian Regional Websites / M. Tariq Banday, Shafiya Afzal Sheikh
- A Survey of Traditional and Cloud Specific Security Issues / Sumitra Binu, Mohammed Misbahuddin
- A Chaos Based Method for Efficient Cryptographic S-box Design / Musheer Ahmad [and others]
- A Multicast Authentication Protocol (MAP) for Dynamic Multicast Groups in Wireless Networks / Parag J. Jambhulkar [and others]
- Clustering Based on Trust of a Node in Mobile Ad-Hoc NETworks / Pallavi Khatri, Shashikala Tapaswi, Udai P. Verma.
- A Novel Approach for Monitoring SQL Anti-Forensic Attacks Using Pattern Matching for Digital Forensic Investigation / Vaibhav T. Patil, Amrita A. Manjrekar
- Robust BPSO and Scene Change Based Digital Video Watermarking Algorithm in DWT-DFT-SVD Domain / Rahim Ansari [and others]
- Slide Attacks against Iterated Hill Ciphers / Liam Keliher, Samuel Thibodeau
- Efficient Hierarchical Key Management Scheme Based on Polynomial Construction / B.R. Purushothama, B.B. Amberker
- Hand Vein Authentication System Using Dynamic ROI / Munaga V.N.K. Prasad, Ilaiah Kavati, Kanavu Ravindra
- Vein Pattern Indexing Using Texture and Hierarchical Decomposition of Delaunay Triangulation / Ilaiah Kavati, Munaga V.N.K. Prasad, Chakravarthy Bhagvati
- Short Attribute-Based Group Signature without Random Oracles with Attribute Anonymity / Syed Taqi Ali, B.B. Amberker
- Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function / Ashok Kumar Das, Vanga Odelu, Adrijit Goswami.
- Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks / Ashok Kumar Das, Santanu Chatterjee, Jamuna Kanta Sing
- Work-in-Progress. VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud / Sanchika Gupta, Padam Kumar
- Implementation and Embellishment of Prevention of Keylogger Spyware Attacks / Mohammad Wazid [and others]
- Data Anonymization According to the Combination of Attributes on Social Network Sites / Sanaz Kavianpour, Bharanidharan Shanmugam, Zuraini Ismail
- Secure Multimedia Transmission in P2P Using Recurrence Relation and Evolutionary Algorithm / Ramesh Shahabadkar, Ramchandra V. Pujeri
- Hybrid Approach for Improvising Credit Card Fraud Detection Based on Collective Animal Behaviour and SVM / V. Dheepa, R. Dhanapal
- Recent Trends in Collection of Software Forensics Artifacts: Issues and Challenges / Deepak Gupta, Babu M. Mehtre.
- Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net / Yosra Ben Mustapha, Hervé Debar
- Monitoring Information Leakage in a Web Browser / Nemisha Sharma [and others]
- Securing Biometric Data with Visual Cryptography and Steganography / Deepak Aeloor, Amrita A. Manjrekar
- Forensics Analysis of Sandboxie Artifacts / Deepak Gupta, B.M. Mehte
- An Improved Secure Communication Scheme Using Adaptive Parameter Synchronization / Arti Dwivedi, Ashok K. Mittal, Suneet Dwivedi
- A Side View Based Video in Video Watermarking Using DWT and Hilbert Transform / Loganathan Agilandeeswari, K. Ganesan, K. Muralibabu
- Malware Detection Using API Function Frequency with Ensemble Based Classifier / Pratiksha Natani, Deepti Vidyarthi
- Privacy Issues in Single and Multi-hop Wireless Mesh Network / Sagar Kakade, Ravi Sawant, Deepak C. Karia
- Scalable Key Transport Protocol Using Chinese Remainder Theorem / Manisha Y. Joshi, R.S. Bichkar.