Atjaunināt sīkdatņu piekrišanu

Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings 1st ed. 2015 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 548 pages, height x width: 235x155 mm, weight: 866 g, 239 Illustrations, black and white; XXI, 548 p. 239 illus., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 536
  • Izdošanas datums: 17-Aug-2015
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319229141
  • ISBN-13: 9783319229140
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 548 pages, height x width: 235x155 mm, weight: 866 g, 239 Illustrations, black and white; XXI, 548 p. 239 illus., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 536
  • Izdošanas datums: 17-Aug-2015
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319229141
  • ISBN-13: 9783319229140
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.
Security in Cloud Computing
A Dynamic Multi-domain Access Control Model in Cloud Computing
3(10)
Dapeng Xiong
Peng Zou
Jun Cai
Jun He
Multilevel Threshold Secret Sharing in Distributed Cloud
13(11)
Doyel Pal
Praveenkumar Khethavath
Johnson P. Thomas
Tingling Chen
Secure Sharing of Data in Cloud Computing
24(12)
Deepnarayan Tiwari
G.R. Gangadharan
Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud
36(9)
Naveen Kumar
Anish Mathuria
Manik Lai Das
Adaptive and Secure Application Partitioning for Offloading in Mobile Cloud Computing
45(9)
N.M. Dhanya
G. Kousalya
Intelligent Intrusion Detection System for Private Cloud Environment
54(12)
B. Muthukumar
Praveen Kumar Rajendran
Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Computing
66(12)
Ronak Vyas
Alok Singh
Jolly Singh
Gunjan Soni
B.R. Purushothama
FPGA Implementation of 128-Bit Fused Multiply Add Unit for Crypto Processors
78(11)
Sandeep Kakde
Mithilesh Mahindra
Alish Khobragade
Nikit Shah
Authentication and Access Control Systems
A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images
89(10)
Quist-Aphetsi Kester
Laurent Nana
Anca Christine Pascu
Sophie Gire
Jojo M. Eghan
Nii Narku Quaynor
Anonymizing Classification Data for Preserving Privacy
99(11)
Sarat kr. Chettri
B. Borah
An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET
110(12)
Vimal Kumar
Rakesh Kumar
Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme
122(12)
Byrapura Rangappa Purushothama
B.B. Amberker
Cryptanalysis and Improvement of ECC - Based Security Enhanced User Authentication Protocol for Wireless Sensor Networks
134(12)
Anup Kumar Maurya
V.N. Sastry
Siba Kumar Udgata
Secure and Privacy Preserving Biometric Authentication Using Watermarking Technique
146(11)
Doyel Pal
Praveenkumar Khethavath
Johnson P. Thomas
Tingting Chen
Reducing Vulnerability of a Fingerprint Authentication System
157(11)
A. Athira Ram
T.S. Jyothis
Heart Rate Variability for Biometric Authentication Using Time-Domain Features
168(8)
Nazneen Akhter
Hanumant Gite
Gulam Rabbani
Karbhari Kale
Modeling Fuzzy Role Based Access Control Using Fuzzy Formal Concept Analysis
176(10)
Chandra Mouliswaran Subramanian
Aswani Kumar Cherukuri
Chandrasekar Chelliah
An Efficient Fingerprint Minutiae Detection Algorithm
186(11)
Y. Prashanth Reddy
Kamlesh Tiwari
Vandana Dixit Kaushik
Phalguni Gupta
Cryptography and Steganography
An Improved Substitution Method for Data Encryption Using DNA Sequence and CDMB
197(10)
Ravi Gupta
Rahul Kumar Singh
Analysis of Neural Synchronization Using Genetic Approach for Secure Key Generation
207(10)
S. Santhanalakshmi
K. Sangeeta
G.K. Patra
CLCT: Cross Language Cipher Technique
217(11)
Laukendra Singh
Rahul Johari
A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images
228(10)
Quist-Aphetsi Kester
Laurent Nana
Anca Christine Pascu
Sophie Gire
Jojo M. Eghan
NU Narku Quaynor
A Coupled Chaos Based Image Encryption Scheme Using Bit Level Diffusion
238(9)
P. Devaraj
C. Kavitha
Secure Communication Using Digital Watermarking with Encrypted Text Hidden in an Image
247(9)
M. Sundari
P.B. Revathi
S. Sumesh
A Novel Image Encryption Scheme Using an Irrevocable Multimodal Biometric Key
256(9)
M. Suchithra
O.K. Sikha
Dual Stage Text Steganography Using Unicode Homoglyphs
265(12)
Sachin Hosmani
H.G. Rama Bhat
K. Chandrasekaran
Securing Database Server Using Homomorphic Encryption and Re-encryption
277(13)
Sarath Greeshma
R. Jayapriya
A Robust and Secure DWT-SVD Digital Image Watermarking Using Encrypted Watermark for Copyright Protection of Cheque Image
290(17)
Sudhanshu Suhas Gonge
Ashok Ghalol
System and Network Security
Occlusion Detection Based on Fractal Texture Analysis in Surveillance Videos Using Tree-Based Classifiers
307(10)
J. Arunnehru
M. Kalaiselvi Geetha
T. Nanthini
A Modus Operandi for Social Networking Security Solutions Based on Varied Usages
317(12)
R. Kamalchi
Kanika Minocha
A Secret Common Information Duality for Tripartite Noisy Correlations
329(13)
Pradeep Kr. Banerjee
Exploiting Domination in Attack Graph for Enterprise Network Hardening
342(12)
Ghanshyam S. Bopche
Babu M. Mehtre
Modeling Dependencies of ISO/IEC 27002:2013 Security Controls
354(14)
Anirban Sengupta
Secure Cluster Based Routing Scheme (SCBRS) for Wireless Sensor Networks
368(13)
Sohini Roy
A Pareto Survivor Function Based Cluster Head Selection Mechanism (PSFCHSM) to Mitigate Selfish Nodes in Wireless Sensor Networks
381(11)
PL. Rajarajeswari
N.K. Karthikeyan
Vehicle Brake and Indicator Detection for Autonomous Vehicles
392(10)
R. Sathya
M. Kalaiselvi Geetha
P. Aboorvapriya
Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks
402(10)
Jeril Kuriakose
V. Amruth
R. Vikram Raju
Human Activity Recognition Based on Motion Projection Profile Features in Surveillance Videos Using Support Vector Machines and Gaussian Mixture Models
412(12)
J. Arunnehru
M. Kalaiselvi Geetha
Analysis of Accountability Property in Payment Systems Using Strand Space Model
424(14)
Venkatasamy Sureshkumar
Anitha Ramalingam
S. Anandhi
Technical Aspects of Cyber Kill Chain
438(17)
Tarun Yadav
Arvind Mallari Rao
Application Security
Detection and Mitigation of Android Malware Through Hybrid Approach
455(9)
Kanubhai Patel
Bharat Buddadev
Malicious Circuit Detection for Improved Hardware Security
464(9)
R. Bharath
G. Arun Sabari
Dhinesh Ravi Krishna
Arun Prasathe
K. Harish
N. Mohankumar
M. Nirmala Devi
Framework for Live Forensics of a System by Extraction of Clipboard Data and Other Forensic Artefacts from RAM Image
473(10)
Rohil Sharma
Upasna Singh
Anomaly Detection Through Comparison of Heterogeneous Machine Learning Classifiers vs KPCA
483(13)
Goverdhan Reddy Jidiga
P. Sammulal
Android Users Security via Permission Based Analysis
496(10)
Pradeep Kumar Tiwari
Upasna Singh
Data-Centric Refinement of Information Flow Analysis of Database Applications
506(13)
Md. Imran Alam
Raju Haider
Detection and Diagnosis of Hardware Trojan Using Power Analysis
519(11)
Eknadh Vaddi
Karthik Goddam
Rahul Karthik Maniam
Sai Abhishek Mallavajjala
Srinivasulu Dasari
M. Nirmala Devi
A Low Overhead Prevention of Android WebView Abuse Attacks
530(8)
K. Jamsheed
K. Praveen
An Automata Based Approach for the Prevention of NoSQL Injections
538(9)
Swathy Joseph
K.P. Jevitha
Author Index 547