Accepted Papers
Number of Submissions: 132
Accepted Regular Papers: 30
Accepted Work-in-Progress: 12
S40: SSCC’14: Authentication and Access Control Systems; Encryption and Cryptography
1569962223 |
PWLCM Based Video Encryption Through Compressive Sensing |
Regular Paper |
Abhishek Kolazi (National Institute Of Technol Calicut, India); Sudhish George (National Institute of Technology, Calicut, India); Deepthi P.p (NIT Calicut, India) |
1569965373 |
Cryptanalysis of Image Encryption Algorithm Based on Pixel Shuffling and Chaotic S-box Transformation |
Regular Paper |
Pankaj Kumar Sharma (Jamia Millia Islamia, India); Musheer Ahmad (Jamia Millia Islamia, New Delhi, India); Parvez M Khan (Integral University IUL, India) |
1569968177 |
Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structures |
Regular Paper |
Dileep Pattiapti (University of Hyderabad, India); Appala Naidu Tentu (CR Rao AIMSCS, India); China Vadlamudi (University of Hyderabad, India) |
1569969467 |
Security Enhancement in Web Services by Detecting and Correcting Anomalies in XACML Policies At Design Level |
Regular Paper |
Priyadharshini M (Anna University, India); Yowan J (AnnaUniversity, India); Baskaran R (Anna University, India) |
1569969483 |
Cheating Prevention Using Genetic Feature Based Key in Secret Sharing Schemes |
Regular Paper |
L Jani Anbarasi (Research Scholar ,Anna University, India); Modigari Narendra (Sri Ramakrishna Institute of Technology, India); Anandha Mala G. s (AnnaUniversity, Chennai, India) |
1569969801 |
Design for Prevention of Intranet Information Leakage via Emails |
Regular Paper |
Krishnashree Achuthan (Amrita School of Engineering, India); Neenu Manmadhan (Amrita University, India); Hari Narayanan (Amrita Vishwa Vidyapeetham, India); Jayaraj Poroor (Amrita Vishwa Vidyapeetham (Amrita University), India) |
1569969841 |
A mathematical analysis of Elliptic Curve point multiplication |
Regular Paper |
Ravi Kishore Kodali (National Institute of Technology, Warangal, India) |
1569971125 |
An Approach to Cryptographic Key Exchange Using Fingerprint |
Regular Paper |
Subhas Barman (Govt. College of Engineering and Textile Technology, Berhampore, India); Samiran Chattopadhyay (Jadavpur University, India); Debasis Samanta (Indian Institute of Technology, Kharagpur, India) |
1569972073 |
Tag Digit Based Honeypot to Detect Shoulder Surfing Attack |
Regular Paper |
Nilesh Chakraborty (Indian Institute of Technology Patna, India); Samrat Mondal (IIT Patna, India) |
S41: SSCC’14: Security and Privacy in Networked Systems
1569954613 |
Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks |
Regular Paper |
Odelu Vanga (Indian Institute of Technology Kharagpur, India); Ashok Kumar Das (IIIT Hyderabad, India); A. Goswami (Indian Institute of Technology, Kharagpur, India) |
1569957521 |
Secure Hierarchical Routing Protocol (SHRP) for Wireless Sensor Network |
Regular Paper |
Sohini Roy (Calcutta Institute of Engineering and Management, India); Ayan Das (Calcutta Institute of Engineering and Management, India) |
1569968393 |
Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks |
Regular Paper |
Ashok Kumar Das (IIIT Hyderabad, India) |
1569969493 |
Power Aware and Secure Dynamic Source Routing Protocol in Mobile Ad Hoc Networks |
Regular Paper |
Mohit Miglani (Computer Sciences Corporation, India); Deepika Kukreja (University School of Information and Technology Maharaja Agrasen Institute of Technology, India); Sanjay Kumar Dhurandher (Netaji Subhas Institute of Technology, India); B Reddy (GGSIPU, India) |
1569969495 |
Peers Feedback and Compliance Based Trust Computation for Cloud Computing |
Regular Paper |
Jagpreet Sidhu, Er. (Panjab University, India); Sarbjeet Singh (Panjab University, Chandigarh, India) |
1569969889 |
A Review on Mobile Sensor Localization |
Regular Paper |
Jeril Kuriakose (School of Computing and Information Technology Manipal University Jaipur, India); Amruth V (Bearys Institute Of Technology, India); Sandesh Ag. (Einsys Consulting Pvt. Ltd., India); Abhilash V (Freelancer, India); Prasanna Kumar (National Institute of Engineering, India); Nithin K (Assistant Profesor, India) |
1569973399 |
Research on Access Control Techniques in SaaS of Cloud Computing |
Regular Paper |
Shabana Rehman (Salman bin Abdul Aziz University, Saudi Arabia); Rahul Gautam (Center of Development of Advanced Computing, India) |
1569973929 |
Fair-Trust Evaluation Approach (F-TEA) for Cloud Environment |
Regular Paper |
Kandaswamy Gokulnath (Anna University, India); Rhymend Uthaiaraj (Anna University, India) |
1569974047 |
Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks |
Regular Paper |
Satria Mandala (UniversitiTeknologi Malaysia, Malaysia); Maznah Kamat (Universiti Teknologi Malsysia, Malaysia); Md Asri Ngadi (Universiti Teknologi Malaysia UTM, Malaysia); Yahaya Coulibaly (Universiti Teknologi Malaisia, Malaysia); Kommineni Jenni (Universiti Teknologi Malaysia, Malaysia) |
S42: SSCC’14: System and Network Security
1569960743 |
Low Complex System for Physical Layer Security Using NLFG and QCLDPC Code |
Regular Paper |
Celine Stuart (National Institute of Technology, India); Deepthi P.p (NIT Calicut, India) |
1569963207 |
Design and Analysis of Online Punjabi Signature Verification System Using Grid Optimization |
Regular Paper |
Ankita Wadhawan (DAV Institute of Engineering and Technology, India); Dinesh Kumar (DAV Institute of Engineering Technology, India) |
1569965997 |
An Improved EMHS Algorithm for Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database |
Regular Paper |
Rachit Adhvaryu (Gujarat Technological University, India); Nikunj Domadiya (Gujarat Technological University, India) |
1569966637 |
A Novel Comparison Based Non Blocking Approach for Fault Tolerence in Mobile Agent Systems |
Regular Paper |
Richa Mahajan (GNDU, India); Rahul Hans (D A V Institute of Engineering and Technology, India) |
1569967781 |
An Integrated Approach of E-RED and ANT Classification Methods for DRDoS Attacks |
Regular Paper |
P Mohana Priya (Anna University, India); Akilandeswari V (Anna University, India); G Akilarasu (Thiagarajar College of Engineering, India); Mercy Shalinie (Thiagarajar College of engineering, India) |
1569968403 |
Category Based Malware detection for Android |
Regular Paper |
Vijayendra Grampurohit (IIIT Hyderabad, India); Vijay Kumar (IIIT Hyderabad, India); Sanjay Rawat (IIIT Hyderabad, India); Shatrunjay Rawat (IIIT Hyderabad, India) |
1569968617 |
Framework of Lightweight Secure Media Transfer for Mobile Law Enforcement Apps |
Regular Paper |
Suash Deb (Cambridge Institute of Technology, India); Simon Fong (University of Macau, Macao); Sabu Thampi (Indian Institute of Information Technology Management, India) |
1569968693 |
Internal Hardware States Based Privacy Extension of IPv6 Addresses |
Regular Paper |
Reshmi Tr (Ramanujan Computing Centre Anna University, India); Shiney Manoharan (Anna University, India); Krishnan Murugan (Anna University, India) |
1569969161 |
DDoS Detection System using Wavelet features and semi-supervised learning |
Regular Paper |
Srihari V (PSG College of Technology, India); R Anitha (PSG College of Technology, India) |
1569969917 |
Secure Communication Using Four-wing Hyper-chaotic Attractor |
Regular Paper |
Arti Dwivedi (University of Allahabad, India); Ashok Mittal (University of Allahabad, India); Suneet Dwivedi (University of Allahabd, India) |
1569970083 |
Watermark Detection in Spatial and Transform Domains Based on Tree Structured Wavelet Transform |
Regular Paper |
Ivy Prathap (PSG College of Technology, Coimbatore, India); Anitha Ramalingam (PSG College of Technology, India) |
1569974383 |
Forensic Analysis for Monitoring Database Transactions |
Regular Paper |
Harmeet Khanuja (University of Pune, India); Dattatraya S Adane (Ramdeobaba K.N.Engg., college, RTM Nagpur University, India) |
S43: SSCC’14: Work-in-Progress
1569926983 |
Piracy Control Using Secure Disks |
Work-in-Progress |
Jitendra Lulla (Chelsio Communications, India); Varsha Sharma (Wipro Technologies, India) |
1569959947 |
Authentication of Trusted Platform Module Using Processor Response |
Work-in-Progress |
Vikash Kumar Rai (Defence Institute of Advanced Technology, Pune, India); Arun Mishra (Defence Institute of Advanced Technology, India) |
1569962633 |
Design of Security System of Portable Device: Securing XML Web Services with ECC |
Work-in-Progress |
Gopinath V (Sathyabama University TCS ltd, India); Raghuvel Subramaniam Bhuvaneswaran (Anna University, Chennai, India) |
1569963129 |
Analyzer Router: An Approach to Detect and Recover From OSPF Attacks |
Work-in-Progress |
Deepak Sangroha (AIACTR, India); Vishal Gupta (AIACTR, India) |
1569963159 |
Vulnerability of MR-ARP in Prevention of ARP Poisoning and Solution |
Work-in-Progress |
Mukul Tiwari (DIT University DIT University, Dehradun, India); Sumit Kumar (ABB Global Industries and Services, India) |
1569965265 |
A Heuristic Model for Performing Digital Forensics in Cloud Computing Environment |
Work-in-Progress |
Povar Digambar (BITS Pilani Hyderabad, India); Geethakumari G (BITS-Pilani, Hyderabad Campus, India) |
1569967147 |
CAVEAT: Credit Card Vulnerability Exhibition and Authentication Tool |
Work-in-Progress |
Ishu Jain (GGSIPU, India); Rahul Johari (GGSIP University, India); R Ujjwal (GGSIPU, Delhi, India) |
1569968659 |
Detection of Active Attacks on Wireless IMDs Using Proxy Device and Localization Information |
Work-in-Progress |
Monika Darji (Gujarat Technological University, India); Bhushan H Trivedi (GLS Institute Of Computer Technology, India) |
1569969093 |
SQL Filter - SQL Injection Prevention and logging using Dynamic Network Filter |
Work-in-Progress |
Jignesh C Doshi (L J Institute of Management Studies, Ahmedabad, India); Maxwell Christian (Gujarat Technological University, India); Bhushan H Trivedi (GLS Institute Of Computer Technology, India) |
1569969401 |
Results on (2,n) Visual Cryptographic schemes |
Work-in-Progress |
Kanakkath Praveen (Amrita Vishwa Vidyapeetham, India); Sethumadhavan M (Amrita Vishwa Vidyapeetham, India) |
1569971033 |
Zero Distortion Technique: An Approach to Image Stagenography using Strength of Indexed Based Chaotic Sequence |
Work-in-Progress |
Shivani Sharma (ABES-EC, Ghaziabad, India); Virendra Kumar Yadav (ABES Engineering College, India); Saumya Batham (ABES Engineering College, Ghaziabad, India) |
1569973599 |
Attack Graph- Generation, Visualization and Analysis: Issues and Challenges |
Work-in-Progress |
Ghanshyam Bopche (Institute for Development and Research in Banking Technology (IDRBT) School of Computer and Information Sciences (SCIS), University of Hyderabad, India); Babu Mehtre (IDRBT - Institute for Development and Research in Banking Technology Reserve Bank of India, India) |
Hosted By