default search action
SSCC 2013: Mysore, India
- Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martínez Pérez:
Security in Computing and Communications - International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings. Communications in Computer and Information Science 377, Springer 2013, ISBN 978-3-642-40575-4
Regular Papers
- Sunil Malipatlolla:
A Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System. 1-9 - Animesh Roy, Debasis Mitra:
Signature Embedding in the Functional Description of Reversible Circuit. 10-17 - Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet:
Detecting Laser Fault Injection for Smart Cards Using Security Automata. 18-29 - Lazaros Kyrillidis, Graham Hili, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis:
Virtual World Authentication Using the Smart Card Web Server. 30-41 - Chandra Sekhar Vorugunti, Mrudula Sarvabhatla:
A More Efficient and Secure Authentication Scheme over Insecure Networks Using Smart Cards. 42-51 - G. Jyothish Lal, V. K. Veena, K. P. Soman:
A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value Decomposition. 52-62 - L. N. Pradeep, Aniruddha Bhattacharjya:
Random Key and Key Dependent S-box Generation for AES Cipher to Overcome Known Attacks. 63-69 - Anil Gopalakrishna, Alwyn Roshan Pais:
Emulating a High Interaction Honeypot to Monitor Intrusion Activity. 70-76 - Manali Dubal, Aaradhana Deshmukh:
On Pseudo-random Number Generation Using Elliptic Curve Cryptography. 77-89 - Ingo Stierand, Sunil Malipatlolla:
Exploiting Functional Models to Assess the Security Aspect in Embedded System Design. 90-97 - M. Tariq Banday, Shafiya Afzal Sheikh:
Design of CAPTCHA Script for Indian Regional Websites. 98-109 - Sumitra Binu, Mohammed Misbahuddin:
A Survey of Traditional and Cloud Specific Security Issues. 110-129 - Musheer Ahmad, Hitesh Chugh, Avish Goel, Prateek Singla:
A Chaos Based Method for Efficient Cryptographic S-box Design. 130-137 - Parag J. Jambhulkar, Soumyadev Maity, Ramesh C. Hansdah:
A Multicast Authentication Protocol (MAP) for Dynamic Multicast Groups in Wireless Networks. 138-149 - Pallavi Khatri, Shashikala Tapaswi, Udai P. Verma:
Clustering Based on Trust of a Node in Mobile Ad-Hoc NETworks. 150-161 - Vaibhav T. Patil, Amrita A. Manjrekar:
A Novel Approach for Monitoring SQL Anti-Forensic Attacks Using Pattern Matching for Digital Forensic Investigation. 162-167 - Rahim Ansari, Mrutyunjayya Devanalamath, Maher Hussain, V. Punya Prabha:
Robust BPSO and Scene Change Based Digital Video Watermarking Algorithm in DWT-DFT-SVD Domain. 168-178 - Liam Keliher, Samuel Thibodeau:
Slide Attacks against Iterated Hill Ciphers. 179-190 - B. R. Purushothama, B. B. Amberker:
Efficient Hierarchical Key Management Scheme Based on Polynomial Construction. 191-202 - Munaga V. N. K. Prasad, Ilaiah Kavati, Kanavu Ravindra:
Hand Vein Authentication System Using Dynamic ROI. 203-212 - Ilaiah Kavati, Munaga V. N. K. Prasad, Chakravarthy Bhagvati:
Vein Pattern Indexing Using Texture and Hierarchical Decomposition of Delaunay Triangulation. 213-222 - Syed Taqi Ali, B. B. Amberker:
Short Attribute-Based Group Signature without Random Oracles with Attribute Anonymity. 223-235 - Ashok Kumar Das, Vanga Odelu, Adrijit Goswami:
Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function. 236-242 - Ashok Kumar Das, Santanu Chatterjee, Jamuna Kanta Sing:
Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks. 243-254
Work-in-Progress
- Sanchika Gupta, Padam Kumar:
VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud. 255-261 - Mohammad Wazid, Robin Sharma, Avita Katal, R. H. Goudar, Priyanka Bhakuni, Asit Tyagi:
Implementation and Embellishment of Prevention of Keylogger Spyware Attacks. 262-271 - Sanaz Kavianpour, Bharanidharan Shanmugam, Zuraini Ismail:
Data Anonymization According to the Combination of Attributes on Social Network Sites. 272-280 - Ramesh Shahabadkar, Ramchandra V. Pujeri:
Secure Multimedia Transmission in P2P Using Recurence Relation and Evolutionary Algorithm. 281-292 - V. Dheepa, R. Dhanapal:
Hybrid Approach for Improvising Credit Card Fraud Detection Based on Collective Animal Behaviour and SVM. 293-302 - Deepak Gupta, Babu M. Mehtre:
Recent Trends in Collection of Software Forensics Artifacts: Issues and Challenges. 303-312 - Yosra Ben Mustapha, Hervé Debar:
Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net. 313-321 - Nemisha Sharma, Swati Kare, Sanket Chichani, Vidhi Naredi, Jyoti Nandimath, Arun Mishra, Arati M. Dixit:
Monitoring Information Leakage in a Web Browser. 322-329 - Deepak Aeloor, Amrita A. Manjrekar:
Securing Biometric Data with Visual Cryptography and Steganography. 330-340 - Deepak Gupta, B. M. Mehte:
Forensics Analysis of Sandboxie Artifacts. 341-352 - Arti Dwivedi, Ashok Kumar Mittal, Suneet Dwivedi:
An Improved Secure Communication Scheme Using Adaptive Parameter Synchronization. 353-365 - Loganathan Agilandeeswari, Ganesan Kaliyaperumal, K. Muralibabu:
A Side View Based Video in Video Watermarking Using DWT and Hilbert Transform. 366-377 - Pratiksha Natani, Deepti Vidyarthi:
Malware Detection Using API Function Frequency with Ensemble Based Classifier. 378-388 - Sagar Kakade, Ravi Sawant, Deepak Chatrabhuj Karia:
Privacy Issues in Single and Multi-hop Wireless Mesh Network. 389-396 - Manisha Y. Joshi, R. S. Bichkar:
Scalable Key Transport Protocol Using Chinese Remainder Theorem. 397-402
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.