Limit search to available items
Book Cover
E-book
Author International Conferences on Security in Computer Networks and Distributed Systems (2012 : Trivandrum, India)

Title Recent trends in computer networks and distributed systems security : International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings / edited by Sabu M. Thampi [and others]
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource
Series Communications in computer and information science, 1865-0929 ; 335
Communications in computer and information science ; 335.
Contents Part 1. Regular Papers -- A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials / Vanga Odelu, Ashok Kumar Das and Adrijit Goswami -- Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation / B.R. Purushothama and B.B. Amberker -- Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection / Nelcileno Araújo, Ruy de Oliveira, Ed' Wilson Tavares Ferreira, Valtemir Nascimento and Ailton Shinoda Akira, et al. -- ID-Based Threshold Signcryption and Group Unsigncryption / Prashant Kumar Mishra, Kunwar Singh and Sudhanshu Baruntar -- Protocol for Secure Submissions into Learning Management Systems / Manjunath Mattam -- Secure Leader Election Algorithm Optimized for Power Saving Using Mobile Agents for Intrusion Detection in MANET / Monika Darji and Bhushan Trivedi -- WAKE: Authentication and Key Establishment for Wireless Mesh Network / Somanath Tripathy and Debasish Sahoo -- Effective Implementation of DES Algorithm for Voice Scrambling / Jinu Elizabeth John, A.S. Remya Ajai and Prabaharan Poornachandran
Towards Constructing a Trustworthy Internet: Privacy-Aware Transfer of Digital Identity Document in Content Centric Internetworking / Amine Abidi, Ghazi Ben Ayed and Farouk Kamoun -- Security Analysis of CAPTCHA / Anjali Avinash Chandavale and A. Sapkal -- Imperceptible Image Indexing Using Digital Watermarking / Jobin Abraham and Varghese Paul -- A New Deterministic Algorithm for Testing Primality Based on a New Property of Prime Numbers / Srikumar Manghat -- Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCC / B.G. Nagaraja and H.S. Jayanna -- Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree / B.R. Purushothama, Kusuma Shirisha and B.B. Amberker -- An Analytical Approach to Position-Based Routing Protocol for Vehicular Ad Hoc Networks / Ram Shringar Raw, Daya Krishan Lobiyal and Sanjoy Das -- Simulation and Evaluation of Different Mobility Models in Ad-Hoc Sensor Network over DSR Protocol Using Bonnmotion Tool / V. Vasanthi and M. Hemalatha -- Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions / Aravind Ashok, Prabaharan Poornachandran and Krishnasree Achuthan
Data Protection and Privacy Preservation Using Searchable Encryption on Outsourced Databases / Lucas Rodrigo Raso Mattos, Vijayaraghavan Varadharajan and Rajarathnam Nallusamy -- A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks / Tiana Razafindralambo, Guillaume Bouffard, Bhagyalekshmy N. Thampi and Jean-Louis Lanet -- Taxonomy of Slow DoS Attacks to Web Applications / Enrico Cambiaso, Gianluca Papaleo and Maurizio Aiello -- Crypto-Precision: Testing Tool for Hash Function / Harshvardhan Tiwari, Ankit Luthra, Himanshu Goel, Sambhav Sharma and Krishna Asawa -- Performance Analysis and Improvement Using LFSR in the Pipelined Key Scheduling Section of DES / P.V. Sruthi, Prabaharan Poornachandran and A.S. Remya Ajai -- Towards Retrieving Live Forensic Artifacts in Offline Forensics / S. Dija, T.R. Deepthi, C. Balan and K.L. Thomas -- Carving of Bitmap Files from Digital Evidences by Contiguous File Filtering / Balan Chelliah, Divya S. Vidyadharan, P. Shabana and K.L. Thomas -- Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks / Adarsh Kumar and Alok Aggarwal
Intrusion Protection against SQL Injection and Cross Site Scripting Attacks Using a Reverse Proxy / S. Fouzul Hidhaya and Angelina Geetha -- Three-Way Handshake-Based OTP Using Random Host-Side Keys for Effective Key Transfer in Symmetric Cryptosystems / P.R. Mahalingam -- Identity Based Privacy Preserving Dynamic Broadcast Encryption for Multi-privileged Groups / Angamuthu Muthulakshmi, Ramalingam Anitha, S. Rohini and Krishnan Princy -- A Virtualization-Level Future Internet Defense-in-Depth Architecture / Jerzy Konorski, Piotr Pacyna, Grzegorz Kolaczek, Zbigniew Kotulski and Krzysztof Cabaj, et al. -- Experimental DRM Model Using Mobile Code and White-Box Encryption / Stefan-Vladimir Ghita, Victor-Valeriu Patriciu and Ion Bica -- Towards a Secure, Transparent and Privacy-Preserving DRM System / Dheerendra Mishra and Sourav Mukhopadhyay -- Time Based Constrained Object Identification in a Dynamic Social Network / M.T. Chitra, R. Priya and Elizabeth Sherly -- A New Approach towards Segmentation for Breaking CAPTCHA / Anjali Avinash Chandavale and A. Sapkal -- A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network Forensics / Aman Jantan, Mohammad Rasmi, Mohd Izham Ibrahim and Azri H.A. Rahman
Part 2. International Workshop on Security in Self-Organising Networks (SelfNet'12) -- Stationary Wavelet Transformation Based Self-recovery of Blind-Watermark from Electrocardiogram Signal in Wireless Telecardiology / Nilanjan Dey, Anamitra Bardhan Roy, Achintya Das and Sheli Sinha Chaudhuri -- eCloudIDS -- Design Roadmap for the Architecture of Next-Generation Hybrid Two-Tier Expert Engine-Based IDS for Cloud Computing Environment / Madhan Kumar Srinivasan, K. Sarukesi, Ashima Keshava and P. Revathy -- A Comparative Study on Wormhole Attack Prevention Schemes in Mobile Ad-Hoc Network / Subhashis Banerjee and Koushik Majumder -- Management of Routed Wireless M-Bus Networks for Sparsely Populated Large-Scale Smart-Metering Installations / Philipp Digeser, Marco Tubolino, Martin Klemm and Axel Sikora -- A Survey of Blackhole Attacks and Countermeasures in Wireless Mobile Ad-hoc Networks / Subhashis Banerjee and Koushik Majumder -- Part 3. International Workshop on Intelligence and Security Informatics for International Security (IIS'12) -- iReSign -- Implementation of Next-Generation Two-Tier Identity Classifier-Based Traffic Sign Recognition System Architecture Using Hybrid / Keerthi Balasundaram, Madhan Kumar Srinivasan and K. Sarukesi
Part 4. Work-in-Progress -- Neural Synchronization by Mutual Learning Using Genetic Approach for Secure Key Generation / S. Santhanalakshmi, T.S.B. Sudarshan and Gopal K. Patra -- eCloudIDS Tier-1 uX-Engine Subsystem Design and Implementation Using Self-Organizing Map (SOM) for Secure Cloud Computing Environment / Madhan Kumar Srinivasan, K. Sarukesi, Ashima Keshava and P. Revathy -- Implementation of MD6 / Ananya Chowdhury and Utpal Kumar Ray -- Location Estimation of Mobile in GSM and CDMA Networks / Adapa Tataram and Alwyn Roshan Pais -- An Adaptive Distributed Intrusion Detection System for Cloud Computing Framework / Deepa Krishnan and Madhumita Chatterjee -- Biologically Inspired Computer Security System: The Way Ahead / Praneet Saurabh, Bhupendra Verma and Sanjeev Sharma -- A Comparative Analysis of the Ant Based Systems for QoS Routing in MANET / Debajit Sensarma and Koushik Majumder -- Efficient Weighted innovative Routing Protocol (EWiRP) to Balance Load in Mobile Ad Hoc Networks (MANETs): Simulation and Feasibility Analysis / Nitin Goel, Shruti Sangwan and Ajay Jangra
Summary This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and Distributed Systems
Analysis Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Coding theory
Computer software
Systems and Data Security
Coding and Information Theory
Bibliography Includes bibliographical references and author index
Notes English
In Springer eBooks
Subject Computer networks -- Security measures -- Congresses
Data encryption (Computer science) -- Congresses
Computer security.
Computer Security
Software
software.
Informatique.
Computer networks -- Security measures
Data encryption (Computer science)
Genre/Form Conference papers and proceedings
Software.
Form Electronic book
Author Thampi, Sabu M
ISBN 9783642341359
3642341357