


default search action
SNDS 2012, Trivandrum, India
- Sabu M. Thampi

, Albert Y. Zomaya, Thorsten Strufe, José M. Alcaraz Calero
, Tony Thomas:
Recent Trends in Computer Networks and Distributed Systems Security - International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings. Communications in Computer and Information Science 335, Springer 2012, ISBN 978-3-642-34134-2
Regular Papers
- Vanga Odelu

, Ashok Kumar Das
, Adrijit Goswami:
A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials. 1-10 - B. R. Purushothama

, Bharat Amberker:
Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation. 11-22 - Nelcileno Araújo, Ruy de Oliveira, Ed Wilson Tavares Ferreira

, Valtemir Nascimento, Ailton Akira Shinoda, Bharat K. Bhargava:
Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection. 23-34 - Prashant Kumar Mishra, Kunwar Singh, Sudhanshu Baruntar:

ID-Based Threshold Signcryption and Group Unsigncryption. 35-44 - Manjunath Mattam:

Protocol for Secure Submissions into Learning Management Systems. 45-53 - Monika Darji, Bhushan Trivedi:

Secure Leader Election Algorithm Optimized for Power Saving Using Mobile Agents for Intrusion Detection in MANET. 54-63 - Somanath Tripathy

, Debasish Sahoo:
WAKE: Authentication and Key Establishment for Wireless Mesh Network. 64-74 - Jinu Elizabeth John, A. S. Remya Ajai

, Prabaharan Poornachandran
:
Effective Implementation of DES Algorithm for Voice Scrambling. 75-84 - Amine Abidi, Ghazi Ben Ayed, Farouk Kamoun

:
Towards Constructing a Trustworthy Internet: Privacy-Aware Transfer of Digital Identity Document in Content Centric Internetworking. 85-96 - Anjali Avinash Chandavale, Ashok M. Sapkal

:
Security Analysis of CAPTCHA. 97-109 - Abraham Jobin

, Paul Varghese:
Imperceptible Image Indexing Using Digital Watermarking. 110-116 - Srikumar Manghat:

A New Deterministic Algorithm for Testing Primality Based on a New Property of Prime Numbers. 117-126 - B. G. Nagaraja

, Haradagere Siddaramaiah Jayanna:
Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCC. 127-134 - B. R. Purushothama

, Kusuma Shirisha, Bharat Amberker:
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree. 135-146 - Ram Shringar Raw, Daya Krishan Lobiyal

, Sanjoy Das
:
An Analytical Approach to Position-Based Routing Protocol for Vehicular Ad Hoc Networks. 147-156 - V. Vasanthi, M. Hemalatha

:
Simulation and Evaluation of Different Mobility Models in Ad-Hoc Sensor Network over DSR Protocol Using Bonnmotion Tool. 157-167 - Aravind Ashok, Prabaharan Poornachandran

, Krishnashree Achuthan:
Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions. 168-177 - Lucas Rodrigo Raso Mattos, Vijayaraghavan Varadharajan, Rajarathnam Nallusamy:

Data Protection and Privacy Preservation Using Searchable Encryption on Outsourced Databases. 178-184 - Tiana Razafindralambo, Guillaume Bouffard

, Bhagyalekshmy N. Thampi, Jean-Louis Lanet:
A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks. 185-194 - Enrico Cambiaso

, Gianluca Papaleo
, Maurizio Aiello
:
Taxonomy of Slow DoS Attacks to Web Applications. 195-204 - Harshvardhan Tiwari

, Ankit Luthra, Himanshu Goel, Sambhav Sharma, Krishna Asawa:
Crypto-Precision: Testing Tool for Hash Function. 205-214 - P. V. Sruthi, Prabaharan Poornachandran

, A. S. Remya Ajai
:
Performance Analysis and Improvement Using LFSR in the Pipelined Key Scheduling Section of DES. 215-224 - S. Dija, T. R. Deepthi, C. Balan, K. L. Thomas:

Towards Retrieving Live Forensic Artifacts in Offline Forensics. 225-233 - Balan Chelliah, Divya S. Vidyadharan, P. Shabana, K. L. Thomas:

Carving of Bitmap Files from Digital Evidences by Contiguous File Filtering. 234-239 - Adarsh Kumar, Alok Aggarwal

:
Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks. 240-251 - S. Fouzul Hidhaya, Angelina Geetha

:
Intrusion Protection against SQL Injection and Cross Site Scripting Attacks Using a Reverse Proxy. 252-263 - P. R. Mahalingam

:
Three-Way Handshake-Based OTP Using Random Host-Side Keys for Effective Key Transfer in Symmetric Cryptosystems. 264-271 - Muthulakshmi Angamuthu, Anitha Ramalingam, S. Rohini, Krishnan Princy:

Identity Based Privacy Preserving Dynamic Broadcast Encryption for Multi-privileged Groups. 272-282 - Jerzy Konorski

, Piotr Pacyna, Grzegorz Kolaczek
, Zbigniew Kotulski
, Krzysztof Cabaj
, Pawel Szalachowski:
A Virtualization-Level Future Internet Defense-in-Depth Architecture. 283-292 - Stefan-Vladimir Ghita, Victor Valeriu Patriciu, Ion Bica

:
Experimental DRM Model Using Mobile Code and White-Box Encryption. 293-303 - Dheerendra Mishra

, Sourav Mukhopadhyay:
Towards a Secure, Transparent and Privacy-Preserving DRM System. 304-313 - M. T. Chitra, R. Priya, Elizabeth Sherly:

Time Based Constrained Object Identification in a Dynamic Social Network. 314-322 - Anjali Avinash Chandavale, Ashok M. Sapkal

:
A New Approach towards Segmentation for Breaking CAPTCHA. 323-335 - Aman Jantan

, Mohammad Rasmi
, Mohd Izham Ibrahim, Azri H. A. Rahman:
A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network Forensics. 336-346
International Workshop on Security in Self-Organising Networks (SelfNet'12)
- Nilanjan Dey

, Anamitra Bardhan Roy, Achintya Das, Sheli Sinha Chaudhuri:
Stationary Wavelet Transformation Based Self-recovery of Blind-Watermark from Electrocardiogram Signal in Wireless Telecardiology. 347-357 - Madhan Kumar Srinivasan

, K. Sarukesi, Ashima Keshava, P. Revathy:
eCloudIDS - Design Roadmap for the Architecture of Next-Generation Hybrid Two-Tier Expert Engine-Based IDS for Cloud Computing Environment. 358-371 - Subhashis Banerjee, Koushik Majumder

:
A Comparative Study on Wormhole Attack Prevention Schemes in Mobile Ad-Hoc Network. 372-384 - Philipp Digeser, Marco Tubolino, Martin Klemm, Axel Sikora:

Management of Routed Wireless M-Bus Networks for Sparsely Populated Large-Scale Smart-Metering Installations. 385-395 - Subhashis Banerjee, Koushik Majumder

:
A Survey of Blackhole Attacks and Countermeasures in Wireless Mobile Ad-hoc Networks. 396-407
International Workshop on Intelligence and Security Informatics for International Security (IIS'12)
- Keerthi Balasundaram, Madhan Kumar Srinivasan

, K. Sarukesi:
iReSign - Implementation of Next-Generation Two-Tier Identity Classifier-Based Traffic Sign Recognition System Architecture Using Hybrid Region-Based Shape Representation Techniques. 408-421
Work-in-Progress
- Santhanalakshmi S

, T. S. B. Sudarshan
, Gopal K. Patra:
Neural Synchronization by Mutual Learning Using Genetic Approach for Secure Key Generation. 422-431 - Madhan Kumar Srinivasan

, K. Sarukesi, Ashima Keshava, P. Revathy:
eCloudIDS Tier-1 uX-Engine Subsystem Design and Implementation Using Self-Organizing Map (SOM) for Secure Cloud Computing Environment. 432-443 - Ananya Chowdhury, Utpal Kumar Ray:

Implementation of MD6. 444-455 - Adapa Tataram, Alwyn Roshan Pais

:
Location Estimation of Mobile in GSM and CDMA Networks. 456-465 - Deepa Krishnan

, Madhumita Chatterjee:
An Adaptive Distributed Intrusion Detection System for Cloud Computing Framework. 466-473 - Praneet Saurabh

, Bhupendra Verma
, Sanjeev Kumar Sharma
:
Biologically Inspired Computer Security System: The Way Ahead. 474-484 - Debajit Sensarma

, Koushik Majumder
:
A Comparative Analysis of the Ant Based Systems for QoS Routing in MANET. 485-496 - Nitin Goel, Shruti Sangwan, Ajay Jangra

:
Efficient Weighted innovative Routing Protocol (EWiRP) to Balance Load in Mobile Ad Hoc Networks (MANETs): Simulation and Feasibility Analysis. 497-506

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














