


default search action
SNDS 2014, Trivandrum, India
- Gregorio Martínez Pérez, Sabu M. Thampi

, Ryan K. L. Ko
, Lei Shu
:
Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings. Communications in Computer and Information Science 420, Springer 2014, ISBN 978-3-642-54524-5
Security and Privacy in Networked Systems
- Rajat Saxena

, Somnath Dey:
Collaborative Approach for Data Integrity Verification in Cloud Computing. 1-15 - C. R. Yamuna Devi

, B. Shivaraj, S. H. Manjula, K. R. Venugopal, Lalit M. Patnaik:
EESOR: Energy Efficient Selective Opportunistic Routing in Wireless Sensor Networks. 16-31 - Sourav Sinha

, Mamata Jenamani
:
A Security Framework for Multi-authority Based e-Sealed Bid Auction System. 32-44 - K. P. Krishna Kumar, G. Geethakumari:

Analysis of Semantic Attacks in Online Social Networks. 45-56 - Sangeetha Dhamodaran

, Vaidehi Vijayakumar
, Valliammai Thirunavukkarasu, Aiswarya Ramesh:
Enhanced Security of PHR System in Cloud Using Prioritized Level Based Encryption. 57-69 - Anuradha Jadiya, Deepak Chatrabhuj Karia:

MM-SOAR: Modified SOAR Protocol Using Multiple Metrics for Wireless Mesh Network. 70-78 - Deepak Chatrabhuj Karia, Shravanee Shinde:

Clustering Based Routing Strategies for Energy Management in Ad-Hoc Networks. 79-90 - Jithin R, Priya Chandran

:
Virtual Machine Isolation - A Survey on the Security of Virtual Machines. 91-102 - T. R. Venugopal Anandharajan, Marcharla Anjaneyulu Bhagyaveni:

Trust Based VM Consolidation in Cloud Data Centers. 103-114 - R. Deepa, S. Swamynathan:

A Trust Model for Directory-Based Service Discovery in Mobile Ad Hoc Networks. 115-126 - C. R. Yamuna Devi

, Deepak Sunder, S. H. Manjula, K. R. Venugopal, Lalit M. Patnaik:
Chain Routing for Convergecast Small Scale Wireless Sensor Networks. 127-138 - Lovejit Singh, Sarbjeet Singh

:
A Genetic Algorithm for Scheduling Workflow Applications in Unreliable Cloud Environment. 139-150 - S. Anithakumari, K. Chandra Sekaran:

Autonomic SLA Management in Cloud Computing Services. 151-159
Multimedia Security
- G. Jyothish Lal

, V. K. Veena:
A Novel Audio Watermark Embedding and Extraction Method Based on Compressive Sensing, Sinusoidal Coding, Reduced SVD, Over Complete Dictionary and L1 Optimization. 160-171 - Nishanth Augustine, Sudhish N. George, P. P. Deepthi:

Compressive Sensing Based Audio Scrambling Using Arnold Transform. 172-183 - Dheerendra Mishra

, Sourav Mukhopadhyay:
Cryptanalysis of Two Authentication Scheme for DRM System. 184-191 - Germain Jolly, Sylvain Vernois, Jean-Luc Lambert:

Improving Test Conformance of Smart Cards versus EMV-Specification by Using on the Fly Temporal Property Verification. 192-201 - Munaga V. N. K. Prasad, Ilaiah Kavati

, B. Adinarayana:
Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Gabor Features. 202-210
Cryptosystems, Algorithms, Primitives
- Dibyendu Roy, Pratish Datta, Sourav Mukhopadhyay:

A New Variant of Algebraic Attack. 211-222 - Muhammad Asif Khan

, Varun Jeoti:
A Novel Design of Chaos Based S-Box Using Difference Distribution Table (CD S-Box). 223-230 - Kanakkath Praveen, K. Rajeev, M. Sethumadhavan

:
On the Extensions of (k, n)*-Visual Cryptographic Schemes. 231-238 - Mridul Sankar Barik, Chandan Mazumdar:

A Graph Data Model for Attack Graph Generation and Analysis. 239-250 - Appala Naidu Tentu, Prabal Paul, V. Ch. Venkaiah:

Computationally Perfect Secret Sharing Scheme Based on Error-Correcting Codes. 251-262 - Jayalakshmi G. Naragund, R. M. Banakar:

Warfare Message Communication in Tactical WMN Using HWMP. 263-274 - R. Anitha

, Saswati Mukherjee:
Metadata Attribute Based Cipher-Key Generation System in Cloud. 275-287 - Dheerendra Mishra

, Sourav Mukhopadhyay:
Cryptanalysis of Yang et al.'s Digital Rights Management Authentication Scheme Based on Smart Card. 288-297
System and Network Security
- Ratinder Kaur

, Maninder Singh
:
Automatic Evaluation and Signature Generation Technique for Thwarting Zero-Day Attacks. 298-309 - Anant V. Nimkar

, Soumya K. Ghosh:
A Theoretical Study on Access Control Model in Federated Systems. 310-321 - Adrian Pauna, Victor Valeriu Patriciu:

CASSHH - Case Adaptive SSH Honeypot. 322-333 - Shree Garg, Anil Kumar Sarje, Sateesh Kumar Peddoju:

Improved Detection of P2P Botnets through Network Behavior Analysis. 334-345 - Nilesh Chakraborty, Samrat Mondal

:
SLASS: Secure Login against Shoulder Surfing. 346-357 - R. Reno Robert:

Differential Execution Analysis for Obfuscation Reduction. 358-369
Short Papers
- Monika Darji, Bhushan Trivedi:

Emergency Aware, Non-invasive, Personalized Access Control Framework for IMDs. 370-381 - Bhavna Saini

, Gaurav Somani:
Index Page Based EDoS Attacks in Infrastructure Cloud. 382-395 - Dinesh Nepolean, I. Karthik, Mu. Preethi, Rahul Goyal, M. Kathirvel Vanethi:

Privacy Preserving Ranked Keyword Search over Encrypted Cloud Data. 396-403 - Marcus Hardt, Arsen Hayrapetyan, A. Paul Millar

, Ahmed Shiraz Memon
:
Combining the X.509 and the SAML Federated Identity Management Systems. 404-415 - Venkatasamy Sureshkumar

, Anitha Ramalingam:
Analysis of Electronic Voting Protocol Using Strand Space Model. 416-427 - Balu Sridevi, G. V. Shirley Julia, S. Rajaram

:
Seamless Handoff of Ping-Pong Calls in Mobile Wimax Networks. 428-439 - Hiran V. Nath

, Babu M. Mehtre:
Static Malware Analysis Using Machine Learning Methods. 440-450 - P. Badharudheen, Anu Mary Chacko

, S. D. Madhu Kumar
:
Making an Application Provenance-Aware through UML - A General Scheme. 451-460 - Balasubramanian Chelliah

, S. Geetha
:
Enhancing E-Payment Security through Biometric Based Personal Authentication Using Steganography Scheme - B-PASS. 461-472
Second International Workshop on Security in Self-Organising Networks (SelfNet 2014)
- Vijay Anand Pandian, T. Gireesh Kumar

:
A Novel Cloud Based NIDPS for Smartphones. 473-484 - Saed Alrabaee, Khaled Khateeb, Fawaz Ali Khasawneh

:
Preserving Database Privacy in Cloud Computing. 485-495 - Mahmoud Khasawneh

, Izadeen Kajman, Rashed Alkhudaidy, Anwar Althubyani:
A Survey on Wi-Fi Protocols: WPA and WPA2. 496-511
Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS 2014)
- M. Sindhu, M. Sethumadhavan

:
On the k-error Joint Linear Complexity and Error Multisequence over F q (char F q = p, prime). 512-519 - Payingat Jilna

, P. P. Deepthi:
Implementation of an Elliptic Curve Based Message Authentication Code for Constrained Environments. 520-529 - Quist-Aphetsi Kester

, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan
, Nii Narku Quaynor:
A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement. 530-539 - Musheer Ahmad

, Parvez Mahmood Khan, Mohd. Zeeshan Ansari
:
A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique. 540-550
Second International Workshop on Trust and Privacy in Cyberspace (CyberTrust 2014)
- Saumya Omanakuttan, Madhumita Chatterjee:

Experimental Analysis on Access Control Using Trust Parameter for Social Network. 551-562

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














