Taj Mahal - one of the world's seven wonders Galgotias College of Engg & Tech., Greater Noida Delhi - City of the cities in India

Accepted Papers

Number of Submissions: 132

Accepted Regular Papers: 30

Accepted Work-in-Progress: 12

 

S40: SSCC’14: Authentication and Access Control Systems; Encryption and Cryptography

1569962223

PWLCM Based Video Encryption Through Compressive Sensing

Regular Paper

Abhishek Kolazi (National Institute Of Technol Calicut, India); Sudhish George (National Institute of Technology, Calicut, India); Deepthi P.p (NIT Calicut, India)

1569965373

Cryptanalysis of Image Encryption Algorithm Based on Pixel Shuffling and Chaotic S-box Transformation

Regular Paper

Pankaj Kumar Sharma (Jamia Millia Islamia, India); Musheer Ahmad (Jamia Millia Islamia, New Delhi, India); Parvez M Khan (Integral University  IUL, India)

1569968177

Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structures

Regular Paper

Dileep Pattiapti (University of Hyderabad, India); Appala Naidu Tentu (CR Rao AIMSCS, India); China Vadlamudi (University of Hyderabad, India)

1569969467

Security Enhancement in Web Services by Detecting and Correcting Anomalies in XACML Policies At Design Level

Regular Paper

Priyadharshini M (Anna University, India); Yowan J (AnnaUniversity, India); Baskaran R (Anna University, India)

1569969483

Cheating Prevention Using Genetic Feature Based Key in Secret Sharing Schemes

Regular Paper

L Jani Anbarasi (Research Scholar ,Anna University, India); Modigari Narendra (Sri Ramakrishna Institute of Technology, India); Anandha Mala G. s (AnnaUniversity, Chennai, India)

1569969801

Design for Prevention of Intranet Information Leakage via Emails

Regular Paper

Krishnashree Achuthan (Amrita School of Engineering, India); Neenu Manmadhan (Amrita University, India); Hari Narayanan (Amrita Vishwa Vidyapeetham, India); Jayaraj Poroor (Amrita Vishwa Vidyapeetham (Amrita University), India)

1569969841

A mathematical analysis of Elliptic Curve point multiplication

Regular Paper

Ravi Kishore Kodali (National Institute of Technology, Warangal, India)

1569971125

An Approach to Cryptographic Key Exchange Using Fingerprint

Regular Paper

Subhas Barman (Govt. College of Engineering and Textile Technology, Berhampore, India); Samiran Chattopadhyay (Jadavpur University, India); Debasis Samanta (Indian Institute of Technology, Kharagpur, India)

1569972073

Tag Digit Based Honeypot to Detect Shoulder Surfing Attack

Regular Paper

Nilesh Chakraborty (Indian Institute of Technology Patna, India); Samrat Mondal (IIT Patna, India)

 

S41: SSCC’14: Security and Privacy in Networked Systems

1569954613

Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks

Regular Paper

Odelu Vanga (Indian Institute of Technology Kharagpur, India); Ashok Kumar Das (IIIT Hyderabad, India); A. Goswami (Indian Institute of Technology, Kharagpur, India)

1569957521

Secure Hierarchical Routing Protocol (SHRP) for Wireless Sensor Network

Regular Paper

Sohini Roy (Calcutta Institute of Engineering and Management, India); Ayan Das (Calcutta Institute of Engineering and Management, India)

1569968393

Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks

Regular Paper

Ashok Kumar Das (IIIT Hyderabad, India)

1569969493

Power Aware and Secure Dynamic Source Routing Protocol in Mobile Ad Hoc Networks

Regular Paper

Mohit Miglani (Computer Sciences Corporation, India); Deepika Kukreja (University School of Information and Technology  Maharaja Agrasen Institute of Technology, India); Sanjay Kumar Dhurandher (Netaji Subhas Institute of Technology, India); B Reddy (GGSIPU, India)

1569969495

Peers Feedback and Compliance Based Trust Computation for Cloud Computing

Regular Paper

Jagpreet Sidhu, Er. (Panjab University, India); Sarbjeet Singh (Panjab University, Chandigarh, India)

1569969889

A Review on Mobile Sensor Localization

Regular Paper

Jeril Kuriakose (School of Computing and Information Technology  Manipal University Jaipur, India); Amruth V (Bearys Institute Of Technology, India); Sandesh Ag. (Einsys Consulting Pvt. Ltd., India); Abhilash V (Freelancer, India); Prasanna Kumar (National Institute of Engineering, India); Nithin K (Assistant Profesor, India)

1569973399

Research on Access Control Techniques in SaaS of Cloud Computing

Regular Paper

Shabana Rehman (Salman bin Abdul Aziz University, Saudi Arabia); Rahul Gautam (Center of Development of Advanced Computing, India)

1569973929

Fair-Trust Evaluation Approach (F-TEA) for Cloud Environment

Regular Paper

Kandaswamy Gokulnath (Anna University, India); Rhymend Uthaiaraj (Anna University, India)

1569974047

Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks

Regular Paper

Satria Mandala (UniversitiTeknologi Malaysia, Malaysia); Maznah Kamat (Universiti Teknologi Malsysia, Malaysia); Md Asri Ngadi (Universiti Teknologi Malaysia  UTM, Malaysia); Yahaya Coulibaly (Universiti Teknologi Malaisia, Malaysia); Kommineni Jenni (Universiti Teknologi Malaysia, Malaysia)

 

S42: SSCC’14: System and Network Security

1569960743

Low Complex System for Physical Layer Security Using NLFG and QCLDPC Code

Regular Paper

Celine Stuart (National Institute of Technology, India); Deepthi P.p (NIT Calicut, India)

1569963207

Design and Analysis of Online Punjabi Signature Verification System Using Grid Optimization

Regular Paper

Ankita Wadhawan (DAV Institute of Engineering and Technology, India); Dinesh Kumar (DAV Institute of Engineering  Technology, India)

1569965997

An Improved EMHS Algorithm for Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database

Regular Paper

Rachit Adhvaryu (Gujarat Technological University, India); Nikunj Domadiya (Gujarat Technological University, India)

1569966637

A Novel Comparison Based Non Blocking Approach for Fault Tolerence in Mobile Agent Systems

Regular Paper

Richa Mahajan (GNDU, India); Rahul Hans (D A V Institute of Engineering and Technology, India)

1569967781

An Integrated Approach of E-RED and ANT Classification Methods for DRDoS Attacks

Regular Paper

P Mohana Priya (Anna University, India); Akilandeswari V (Anna University, India); G Akilarasu (Thiagarajar College of Engineering, India); Mercy Shalinie (Thiagarajar College of engineering, India)

1569968403

Category Based Malware detection for Android

Regular Paper

Vijayendra Grampurohit (IIIT Hyderabad, India); Vijay Kumar (IIIT Hyderabad, India); Sanjay Rawat (IIIT Hyderabad, India); Shatrunjay Rawat (IIIT Hyderabad, India)

1569968617

Framework of Lightweight Secure Media Transfer for Mobile Law Enforcement Apps

Regular Paper

Suash Deb (Cambridge Institute of Technology, India); Simon Fong (University of Macau, Macao); Sabu Thampi (Indian Institute of  Information Technology  Management, India)

1569968693

Internal Hardware States Based Privacy Extension of IPv6 Addresses

Regular Paper

Reshmi Tr (Ramanujan Computing Centre  Anna University, India); Shiney Manoharan (Anna University, India); Krishnan Murugan (Anna University, India)

1569969161

DDoS Detection System using Wavelet features and semi-supervised learning

Regular Paper

Srihari V (PSG College of Technology, India); R Anitha (PSG College of Technology, India)

1569969917

Secure Communication Using Four-wing Hyper-chaotic Attractor

Regular Paper

Arti Dwivedi (University of Allahabad, India); Ashok Mittal (University of Allahabad, India); Suneet Dwivedi (University of Allahabd, India)

1569970083

Watermark Detection in Spatial and Transform Domains Based on Tree Structured Wavelet Transform

Regular Paper

Ivy Prathap (PSG College of Technology, Coimbatore, India); Anitha Ramalingam (PSG College of Technology, India)

1569974383

Forensic Analysis for Monitoring Database Transactions

Regular Paper

Harmeet Khanuja (University of Pune, India); Dattatraya S Adane (Ramdeobaba K.N.Engg., college, RTM Nagpur University, India)

 

S43: SSCC’14: Work-in-Progress

1569926983

Piracy Control Using Secure Disks

Work-in-Progress

Jitendra Lulla (Chelsio Communications, India); Varsha Sharma (Wipro Technologies, India)

1569959947

Authentication of Trusted Platform Module Using Processor Response

Work-in-Progress

Vikash Kumar Rai (Defence Institute of Advanced Technology, Pune, India); Arun Mishra (Defence Institute of Advanced Technology, India)

1569962633

Design of Security System of Portable Device: Securing XML Web Services with ECC

Work-in-Progress

Gopinath V (Sathyabama University  TCS ltd, India); Raghuvel Subramaniam Bhuvaneswaran (Anna University, Chennai, India)

1569963129

Analyzer Router: An Approach to Detect and Recover From OSPF Attacks

Work-in-Progress

Deepak Sangroha (AIACTR, India); Vishal Gupta (AIACTR, India)

1569963159

Vulnerability of MR-ARP in Prevention of ARP Poisoning and Solution

Work-in-Progress

Mukul Tiwari (DIT University  DIT University, Dehradun, India); Sumit Kumar (ABB Global Industries and Services, India)

1569965265

A Heuristic Model for Performing Digital Forensics in Cloud Computing Environment

Work-in-Progress

Povar Digambar (BITS Pilani Hyderabad, India); Geethakumari G (BITS-Pilani, Hyderabad Campus, India)

1569967147

CAVEAT: Credit Card Vulnerability Exhibition and Authentication Tool

Work-in-Progress

Ishu Jain (GGSIPU, India); Rahul Johari (GGSIP University, India); R Ujjwal (GGSIPU, Delhi, India)

1569968659

Detection of Active Attacks on Wireless IMDs Using Proxy Device and Localization Information

Work-in-Progress

Monika Darji (Gujarat Technological University, India); Bhushan H Trivedi (GLS Institute Of Computer Technology, India)

1569969093

SQL Filter - SQL Injection Prevention and logging using Dynamic Network Filter

Work-in-Progress

Jignesh C Doshi (L J Institute of Management Studies, Ahmedabad, India); Maxwell Christian (Gujarat Technological University, India); Bhushan H Trivedi (GLS Institute Of Computer Technology, India)

1569969401

Results on (2,n) Visual Cryptographic schemes

Work-in-Progress

Kanakkath Praveen (Amrita Vishwa Vidyapeetham, India); Sethumadhavan M (Amrita Vishwa Vidyapeetham, India)

1569971033

Zero Distortion Technique: An Approach to Image Stagenography using Strength of Indexed Based Chaotic Sequence

Work-in-Progress

Shivani Sharma (ABES-EC, Ghaziabad, India); Virendra Kumar Yadav (ABES Engineering College, India); Saumya Batham (ABES Engineering College, Ghaziabad, India)

1569973599

Attack Graph- Generation, Visualization and Analysis: Issues and Challenges

Work-in-Progress

Ghanshyam Bopche (Institute for Development and Research in Banking Technology (IDRBT)  School of Computer and Information Sciences (SCIS), University of Hyderabad, India); Babu Mehtre (IDRBT - Institute for Development and Research in Banking Technology  Reserve Bank of India, India)







Hosted By