|
Security in Cloud Computing |
|
|
|
A Dynamic Multi-domain Access Control Model in Cloud Computing |
|
|
3 | (10) |
|
|
|
|
|
Multilevel Threshold Secret Sharing in Distributed Cloud |
|
|
13 | (11) |
|
|
|
|
|
Secure Sharing of Data in Cloud Computing |
|
|
24 | (12) |
|
|
|
Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud |
|
|
36 | (9) |
|
|
|
|
Adaptive and Secure Application Partitioning for Offloading in Mobile Cloud Computing |
|
|
45 | (9) |
|
|
|
Intelligent Intrusion Detection System for Private Cloud Environment |
|
|
54 | (12) |
|
|
|
Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Computing |
|
|
66 | (12) |
|
|
|
|
|
|
FPGA Implementation of 128-Bit Fused Multiply Add Unit for Crypto Processors |
|
|
78 | (11) |
|
|
|
|
|
Authentication and Access Control Systems |
|
|
|
A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images |
|
|
89 | (10) |
|
|
|
|
|
|
|
Anonymizing Classification Data for Preserving Privacy |
|
|
99 | (11) |
|
|
|
An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET |
|
|
110 | (12) |
|
|
|
Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme |
|
|
122 | (12) |
|
Byrapura Rangappa Purushothama |
|
|
|
Cryptanalysis and Improvement of ECC - Based Security Enhanced User Authentication Protocol for Wireless Sensor Networks |
|
|
134 | (12) |
|
|
|
|
Secure and Privacy Preserving Biometric Authentication Using Watermarking Technique |
|
|
146 | (11) |
|
|
|
|
|
Reducing Vulnerability of a Fingerprint Authentication System |
|
|
157 | (11) |
|
|
|
Heart Rate Variability for Biometric Authentication Using Time-Domain Features |
|
|
168 | (8) |
|
|
|
|
|
Modeling Fuzzy Role Based Access Control Using Fuzzy Formal Concept Analysis |
|
|
176 | (10) |
|
Chandra Mouliswaran Subramanian |
|
|
|
|
An Efficient Fingerprint Minutiae Detection Algorithm |
|
|
186 | (11) |
|
|
|
|
|
Cryptography and Steganography |
|
|
|
An Improved Substitution Method for Data Encryption Using DNA Sequence and CDMB |
|
|
197 | (10) |
|
|
|
Analysis of Neural Synchronization Using Genetic Approach for Secure Key Generation |
|
|
207 | (10) |
|
|
|
|
CLCT: Cross Language Cipher Technique |
|
|
217 | (11) |
|
|
|
A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images |
|
|
228 | (10) |
|
|
|
|
|
|
|
A Coupled Chaos Based Image Encryption Scheme Using Bit Level Diffusion |
|
|
238 | (9) |
|
|
|
Secure Communication Using Digital Watermarking with Encrypted Text Hidden in an Image |
|
|
247 | (9) |
|
|
|
|
A Novel Image Encryption Scheme Using an Irrevocable Multimodal Biometric Key |
|
|
256 | (9) |
|
|
|
Dual Stage Text Steganography Using Unicode Homoglyphs |
|
|
265 | (12) |
|
|
|
|
Securing Database Server Using Homomorphic Encryption and Re-encryption |
|
|
277 | (13) |
|
|
|
A Robust and Secure DWT-SVD Digital Image Watermarking Using Encrypted Watermark for Copyright Protection of Cheque Image |
|
|
290 | (17) |
|
|
|
System and Network Security |
|
|
|
Occlusion Detection Based on Fractal Texture Analysis in Surveillance Videos Using Tree-Based Classifiers |
|
|
307 | (10) |
|
|
|
|
A Modus Operandi for Social Networking Security Solutions Based on Varied Usages |
|
|
317 | (12) |
|
|
|
A Secret Common Information Duality for Tripartite Noisy Correlations |
|
|
329 | (13) |
|
|
Exploiting Domination in Attack Graph for Enterprise Network Hardening |
|
|
342 | (12) |
|
|
|
Modeling Dependencies of ISO/IEC 27002:2013 Security Controls |
|
|
354 | (14) |
|
|
Secure Cluster Based Routing Scheme (SCBRS) for Wireless Sensor Networks |
|
|
368 | (13) |
|
|
A Pareto Survivor Function Based Cluster Head Selection Mechanism (PSFCHSM) to Mitigate Selfish Nodes in Wireless Sensor Networks |
|
|
381 | (11) |
|
|
|
Vehicle Brake and Indicator Detection for Autonomous Vehicles |
|
|
392 | (10) |
|
|
|
|
Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks |
|
|
402 | (10) |
|
|
|
|
Human Activity Recognition Based on Motion Projection Profile Features in Surveillance Videos Using Support Vector Machines and Gaussian Mixture Models |
|
|
412 | (12) |
|
|
|
Analysis of Accountability Property in Payment Systems Using Strand Space Model |
|
|
424 | (14) |
|
|
|
|
Technical Aspects of Cyber Kill Chain |
|
|
438 | (17) |
|
|
|
|
|
Detection and Mitigation of Android Malware Through Hybrid Approach |
|
|
455 | (9) |
|
|
|
Malicious Circuit Detection for Improved Hardware Security |
|
|
464 | (9) |
|
|
|
|
|
|
|
|
Framework for Live Forensics of a System by Extraction of Clipboard Data and Other Forensic Artefacts from RAM Image |
|
|
473 | (10) |
|
|
|
Anomaly Detection Through Comparison of Heterogeneous Machine Learning Classifiers vs KPCA |
|
|
483 | (13) |
|
|
|
Android Users Security via Permission Based Analysis |
|
|
496 | (10) |
|
|
|
Data-Centric Refinement of Information Flow Analysis of Database Applications |
|
|
506 | (13) |
|
|
|
Detection and Diagnosis of Hardware Trojan Using Power Analysis |
|
|
519 | (11) |
|
|
|
|
Sai Abhishek Mallavajjala |
|
|
|
|
A Low Overhead Prevention of Android WebView Abuse Attacks |
|
|
530 | (8) |
|
|
|
An Automata Based Approach for the Prevention of NoSQL Injections |
|
|
538 | (9) |
|
|
Author Index |
|
547 | |