Taj Mahal - one of the world's seven wonders Galgotias College of Engg & Tech., Greater Noida Delhi - City of the cities in India

Accepted Papers

Number of Submissions: 132

Accepted Regular Papers: 30

Accepted Work-in-Progress: 12


S40: SSCC’14: Authentication and Access Control Systems; Encryption and Cryptography


PWLCM Based Video Encryption Through Compressive Sensing

Regular Paper

Abhishek Kolazi (National Institute Of Technol Calicut, India); Sudhish George (National Institute of Technology, Calicut, India); Deepthi P.p (NIT Calicut, India)


Cryptanalysis of Image Encryption Algorithm Based on Pixel Shuffling and Chaotic S-box Transformation

Regular Paper

Pankaj Kumar Sharma (Jamia Millia Islamia, India); Musheer Ahmad (Jamia Millia Islamia, New Delhi, India); Parvez M Khan (Integral University  IUL, India)


Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structures

Regular Paper

Dileep Pattiapti (University of Hyderabad, India); Appala Naidu Tentu (CR Rao AIMSCS, India); China Vadlamudi (University of Hyderabad, India)


Security Enhancement in Web Services by Detecting and Correcting Anomalies in XACML Policies At Design Level

Regular Paper

Priyadharshini M (Anna University, India); Yowan J (AnnaUniversity, India); Baskaran R (Anna University, India)


Cheating Prevention Using Genetic Feature Based Key in Secret Sharing Schemes

Regular Paper

L Jani Anbarasi (Research Scholar ,Anna University, India); Modigari Narendra (Sri Ramakrishna Institute of Technology, India); Anandha Mala G. s (AnnaUniversity, Chennai, India)


Design for Prevention of Intranet Information Leakage via Emails

Regular Paper

Krishnashree Achuthan (Amrita School of Engineering, India); Neenu Manmadhan (Amrita University, India); Hari Narayanan (Amrita Vishwa Vidyapeetham, India); Jayaraj Poroor (Amrita Vishwa Vidyapeetham (Amrita University), India)


A mathematical analysis of Elliptic Curve point multiplication

Regular Paper

Ravi Kishore Kodali (National Institute of Technology, Warangal, India)


An Approach to Cryptographic Key Exchange Using Fingerprint

Regular Paper

Subhas Barman (Govt. College of Engineering and Textile Technology, Berhampore, India); Samiran Chattopadhyay (Jadavpur University, India); Debasis Samanta (Indian Institute of Technology, Kharagpur, India)


Tag Digit Based Honeypot to Detect Shoulder Surfing Attack

Regular Paper

Nilesh Chakraborty (Indian Institute of Technology Patna, India); Samrat Mondal (IIT Patna, India)


S41: SSCC’14: Security and Privacy in Networked Systems


Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks

Regular Paper

Odelu Vanga (Indian Institute of Technology Kharagpur, India); Ashok Kumar Das (IIIT Hyderabad, India); A. Goswami (Indian Institute of Technology, Kharagpur, India)


Secure Hierarchical Routing Protocol (SHRP) for Wireless Sensor Network

Regular Paper

Sohini Roy (Calcutta Institute of Engineering and Management, India); Ayan Das (Calcutta Institute of Engineering and Management, India)


Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks

Regular Paper

Ashok Kumar Das (IIIT Hyderabad, India)


Power Aware and Secure Dynamic Source Routing Protocol in Mobile Ad Hoc Networks

Regular Paper

Mohit Miglani (Computer Sciences Corporation, India); Deepika Kukreja (University School of Information and Technology  Maharaja Agrasen Institute of Technology, India); Sanjay Kumar Dhurandher (Netaji Subhas Institute of Technology, India); B Reddy (GGSIPU, India)


Peers Feedback and Compliance Based Trust Computation for Cloud Computing

Regular Paper

Jagpreet Sidhu, Er. (Panjab University, India); Sarbjeet Singh (Panjab University, Chandigarh, India)


A Review on Mobile Sensor Localization

Regular Paper

Jeril Kuriakose (School of Computing and Information Technology  Manipal University Jaipur, India); Amruth V (Bearys Institute Of Technology, India); Sandesh Ag. (Einsys Consulting Pvt. Ltd., India); Abhilash V (Freelancer, India); Prasanna Kumar (National Institute of Engineering, India); Nithin K (Assistant Profesor, India)


Research on Access Control Techniques in SaaS of Cloud Computing

Regular Paper

Shabana Rehman (Salman bin Abdul Aziz University, Saudi Arabia); Rahul Gautam (Center of Development of Advanced Computing, India)


Fair-Trust Evaluation Approach (F-TEA) for Cloud Environment

Regular Paper

Kandaswamy Gokulnath (Anna University, India); Rhymend Uthaiaraj (Anna University, India)


Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks

Regular Paper

Satria Mandala (UniversitiTeknologi Malaysia, Malaysia); Maznah Kamat (Universiti Teknologi Malsysia, Malaysia); Md Asri Ngadi (Universiti Teknologi Malaysia  UTM, Malaysia); Yahaya Coulibaly (Universiti Teknologi Malaisia, Malaysia); Kommineni Jenni (Universiti Teknologi Malaysia, Malaysia)


S42: SSCC’14: System and Network Security


Low Complex System for Physical Layer Security Using NLFG and QCLDPC Code

Regular Paper

Celine Stuart (National Institute of Technology, India); Deepthi P.p (NIT Calicut, India)


Design and Analysis of Online Punjabi Signature Verification System Using Grid Optimization

Regular Paper

Ankita Wadhawan (DAV Institute of Engineering and Technology, India); Dinesh Kumar (DAV Institute of Engineering  Technology, India)


An Improved EMHS Algorithm for Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database

Regular Paper

Rachit Adhvaryu (Gujarat Technological University, India); Nikunj Domadiya (Gujarat Technological University, India)


A Novel Comparison Based Non Blocking Approach for Fault Tolerence in Mobile Agent Systems

Regular Paper

Richa Mahajan (GNDU, India); Rahul Hans (D A V Institute of Engineering and Technology, India)


An Integrated Approach of E-RED and ANT Classification Methods for DRDoS Attacks

Regular Paper

P Mohana Priya (Anna University, India); Akilandeswari V (Anna University, India); G Akilarasu (Thiagarajar College of Engineering, India); Mercy Shalinie (Thiagarajar College of engineering, India)


Category Based Malware detection for Android

Regular Paper

Vijayendra Grampurohit (IIIT Hyderabad, India); Vijay Kumar (IIIT Hyderabad, India); Sanjay Rawat (IIIT Hyderabad, India); Shatrunjay Rawat (IIIT Hyderabad, India)


Framework of Lightweight Secure Media Transfer for Mobile Law Enforcement Apps

Regular Paper

Suash Deb (Cambridge Institute of Technology, India); Simon Fong (University of Macau, Macao); Sabu Thampi (Indian Institute of  Information Technology  Management, India)


Internal Hardware States Based Privacy Extension of IPv6 Addresses

Regular Paper

Reshmi Tr (Ramanujan Computing Centre  Anna University, India); Shiney Manoharan (Anna University, India); Krishnan Murugan (Anna University, India)


DDoS Detection System using Wavelet features and semi-supervised learning

Regular Paper

Srihari V (PSG College of Technology, India); R Anitha (PSG College of Technology, India)


Secure Communication Using Four-wing Hyper-chaotic Attractor

Regular Paper

Arti Dwivedi (University of Allahabad, India); Ashok Mittal (University of Allahabad, India); Suneet Dwivedi (University of Allahabd, India)


Watermark Detection in Spatial and Transform Domains Based on Tree Structured Wavelet Transform

Regular Paper

Ivy Prathap (PSG College of Technology, Coimbatore, India); Anitha Ramalingam (PSG College of Technology, India)


Forensic Analysis for Monitoring Database Transactions

Regular Paper

Harmeet Khanuja (University of Pune, India); Dattatraya S Adane (Ramdeobaba K.N.Engg., college, RTM Nagpur University, India)


S43: SSCC’14: Work-in-Progress


Piracy Control Using Secure Disks


Jitendra Lulla (Chelsio Communications, India); Varsha Sharma (Wipro Technologies, India)


Authentication of Trusted Platform Module Using Processor Response


Vikash Kumar Rai (Defence Institute of Advanced Technology, Pune, India); Arun Mishra (Defence Institute of Advanced Technology, India)


Design of Security System of Portable Device: Securing XML Web Services with ECC


Gopinath V (Sathyabama University  TCS ltd, India); Raghuvel Subramaniam Bhuvaneswaran (Anna University, Chennai, India)


Analyzer Router: An Approach to Detect and Recover From OSPF Attacks


Deepak Sangroha (AIACTR, India); Vishal Gupta (AIACTR, India)


Vulnerability of MR-ARP in Prevention of ARP Poisoning and Solution


Mukul Tiwari (DIT University  DIT University, Dehradun, India); Sumit Kumar (ABB Global Industries and Services, India)


A Heuristic Model for Performing Digital Forensics in Cloud Computing Environment


Povar Digambar (BITS Pilani Hyderabad, India); Geethakumari G (BITS-Pilani, Hyderabad Campus, India)


CAVEAT: Credit Card Vulnerability Exhibition and Authentication Tool


Ishu Jain (GGSIPU, India); Rahul Johari (GGSIP University, India); R Ujjwal (GGSIPU, Delhi, India)


Detection of Active Attacks on Wireless IMDs Using Proxy Device and Localization Information


Monika Darji (Gujarat Technological University, India); Bhushan H Trivedi (GLS Institute Of Computer Technology, India)


SQL Filter - SQL Injection Prevention and logging using Dynamic Network Filter


Jignesh C Doshi (L J Institute of Management Studies, Ahmedabad, India); Maxwell Christian (Gujarat Technological University, India); Bhushan H Trivedi (GLS Institute Of Computer Technology, India)


Results on (2,n) Visual Cryptographic schemes


Kanakkath Praveen (Amrita Vishwa Vidyapeetham, India); Sethumadhavan M (Amrita Vishwa Vidyapeetham, India)


Zero Distortion Technique: An Approach to Image Stagenography using Strength of Indexed Based Chaotic Sequence


Shivani Sharma (ABES-EC, Ghaziabad, India); Virendra Kumar Yadav (ABES Engineering College, India); Saumya Batham (ABES Engineering College, Ghaziabad, India)


Attack Graph- Generation, Visualization and Analysis: Issues and Challenges


Ghanshyam Bopche (Institute for Development and Research in Banking Technology (IDRBT)  School of Computer and Information Sciences (SCIS), University of Hyderabad, India); Babu Mehtre (IDRBT - Institute for Development and Research in Banking Technology  Reserve Bank of India, India)

Hosted By