Limit search to available items
Book Cover
E-book
Author SSCC (Conference) (2013 : Mysore, India)

Title Security in computing and communications : international symposium, SSCC 2013, Mysore, India, August 22-24, 2013 : proceedings / Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez (eds.)
Published Heidelberg : Springer, [2013]
©2013

Copies

Description 1 online resource (xvi, 404 pages) : illustrations
Series Communications in computer and information science, 1865-0929 ; 377
Communications in computer and information science ; 377.
Contents Regular Papers. A Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System / Sunil Malipatlolla -- Signature Embedding in the Functional Description of Reversible Circuit / Animesh Roy, Debasis Mitra -- Detecting Laser Fault Injection for Smart Cards Using Security Automata / Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet -- Virtual World Authentication Using the Smart Card Web Server / Lazaros Kyrillidis [and others] -- A More Efficient and Secure Authentication Scheme over Insecure Networks Using Smart Cards / Chandra Sekhar Vorugunti, Mrudula Sarvabhatla -- A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value Decomposition / G. Jyothish Lal, V.K. Veena, K.P. Soman -- Random Key and Key Dependent S-box Generation for AES Cipher to Overcome Known Attacks / L.N. Pradeep, Aniruddha Bhattacharjya
Emulating a High Interaction Honeypot to Monitor Intrusion Activity / Anil Gopalakrishna, Alwyn Rosham Pais -- On Pseudo-random Number Generation Using Elliptic Curve Cryptography / Manali Dubal, Aaradhana Deshmukh -- Exploiting Functional Models to Assess the Security Aspect in Embedded System Design / Ingo Stierand, Sunil Malipatlolla -- Design of CAPTCHA Script for Indian Regional Websites / M. Tariq Banday, Shafiya Afzal Sheikh -- A Survey of Traditional and Cloud Specific Security Issues / Sumitra Binu, Mohammed Misbahuddin -- A Chaos Based Method for Efficient Cryptographic S-box Design / Musheer Ahmad [and others] -- A Multicast Authentication Protocol (MAP) for Dynamic Multicast Groups in Wireless Networks / Parag J. Jambhulkar [and others] -- Clustering Based on Trust of a Node in Mobile Ad-Hoc NETworks / Pallavi Khatri, Shashikala Tapaswi, Udai P. Verma
A Novel Approach for Monitoring SQL Anti-Forensic Attacks Using Pattern Matching for Digital Forensic Investigation / Vaibhav T. Patil, Amrita A. Manjrekar -- Robust BPSO and Scene Change Based Digital Video Watermarking Algorithm in DWT-DFT-SVD Domain / Rahim Ansari [and others] -- Slide Attacks against Iterated Hill Ciphers / Liam Keliher, Samuel Thibodeau -- Efficient Hierarchical Key Management Scheme Based on Polynomial Construction / B.R. Purushothama, B.B. Amberker -- Hand Vein Authentication System Using Dynamic ROI / Munaga V.N.K. Prasad, Ilaiah Kavati, Kanavu Ravindra -- Vein Pattern Indexing Using Texture and Hierarchical Decomposition of Delaunay Triangulation / Ilaiah Kavati, Munaga V.N.K. Prasad, Chakravarthy Bhagvati -- Short Attribute-Based Group Signature without Random Oracles with Attribute Anonymity / Syed Taqi Ali, B.B. Amberker -- Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function / Ashok Kumar Das, Vanga Odelu, Adrijit Goswami
Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks / Ashok Kumar Das, Santanu Chatterjee, Jamuna Kanta Sing -- Work-in-Progress. VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud / Sanchika Gupta, Padam Kumar -- Implementation and Embellishment of Prevention of Keylogger Spyware Attacks / Mohammad Wazid [and others] -- Data Anonymization According to the Combination of Attributes on Social Network Sites / Sanaz Kavianpour, Bharanidharan Shanmugam, Zuraini Ismail -- Secure Multimedia Transmission in P2P Using Recurrence Relation and Evolutionary Algorithm / Ramesh Shahabadkar, Ramchandra V. Pujeri -- Hybrid Approach for Improvising Credit Card Fraud Detection Based on Collective Animal Behaviour and SVM / V. Dheepa, R. Dhanapal -- Recent Trends in Collection of Software Forensics Artifacts: Issues and Challenges / Deepak Gupta, Babu M. Mehtre
Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net / Yosra Ben Mustapha, Hervé Debar -- Monitoring Information Leakage in a Web Browser / Nemisha Sharma [and others] -- Securing Biometric Data with Visual Cryptography and Steganography / Deepak Aeloor, Amrita A. Manjrekar -- Forensics Analysis of Sandboxie Artifacts / Deepak Gupta, B.M. Mehte -- An Improved Secure Communication Scheme Using Adaptive Parameter Synchronization / Arti Dwivedi, Ashok K. Mittal, Suneet Dwivedi -- A Side View Based Video in Video Watermarking Using DWT and Hilbert Transform / Loganathan Agilandeeswari, K. Ganesan, K. Muralibabu -- Malware Detection Using API Function Frequency with Ensemble Based Classifier / Pratiksha Natani, Deepti Vidyarthi -- Privacy Issues in Single and Multi-hop Wireless Mesh Network / Sagar Kakade, Ravi Sawant, Deepak C. Karia -- Scalable Key Transport Protocol Using Chinese Remainder Theorem / Manisha Y. Joshi, R.S. Bichkar
Summary This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submissions. The papers cover all aspects of secure computing and communication in networking and distributed systems such as cloud-based data centers
Bibliography Includes bibliographical references and index
Notes Online resource; title from PDF title page (SpringerLink, viewed September 26, 2013)
Subject Computer networks -- Security measures -- Congresses
Computers -- Access control -- Congresses
Computer security.
Computer Security
Computer security
Computer networks -- Security measures
Computers -- Access control
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Thampi, Sabu M., editor.
Atrey, Pradeep K., editor.
Fan, Chun-I., editor
Martinez Pérez, Gregorio, editor.
ISBN 9783642405761
3642405762
3642405754
9783642405754