Accepted Papers


Number of Submissions: 157



Regular Papers

  1. 1570110889 - Intelligent Intrusion Detection System for Private Cloud Environment
  2. 1570113087 - Modeling Dependencies of ISO/IEC 27002:2013 Security Controls
  3. 1570116945 - An Improved Substitution Method for Data Encryption Using DNA Sequence and CDMB
  4. 1570118269 - A Dynamic Multi-domain Access Control Model in Cloud Computing
  5. 1570118447 - Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks
  6. 1570122613 - Data-centric Refinement of Information Flow Analysis of Database Applications
  7. 1570122625 - An Efficient Fingerprint Minutiae Detection Algorithm
  8. 1570124071 - Human Activity Recognition Based on Motion Projection Profile Features in Surveillance Videos Using Support Vector Machines and Gaussian Mixture Models
  9. 1570124193 - Analysis of Neural Synchronization Using Genetic Approach for Secure Key Generation
  10. 1570124359 - Occlusion Detection Based on Fractal Texture Analysis in Surveillance Videos Using Tree-based Classifiers
  11. 1570125641 - Secure Cluster Based Routing Scheme (SCBRS) for Wireless Sensor Networks
  12. 1570126871 - Analysis of Accountability Property in Payment Systems Using Strand Space Model
  13. 1570128571 - Polynomial Construction and Non-Tree Based Efficient Secure Group Key Management Scheme
  14. 1570128693 - Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud
  15. 1570128759 - Vehicle Brake and Indicator Detection for Autonomous Vehicles
  16. 1570128987 - Framework for Live Forensics of a System by Extraction of Clipboard Data and Other Forensic Artefacts From RAM Image
  17. 1570129209 - Exploiting Domination in Attack Graph for Enterprise Network Hardening
  18. 1570129329 - Android Users Security via Permission Based Analysis
  19. 1570129505 - An Automata Based Approach for the Prevention of NoSQL Injections
  20. 1570129553 - Detection and Mitigation of Android Malware through Hybrid Approach
  21. 1570129587 - Anonymizing Classification Data for Preserving Privacy
  22. 1570129783 - Detection and Diagnosis of Hardware Trojan Using Power Analysis
  23. 1570129829 - Cryptanalysis and Improvement of ECC - Based Security Enhanced User Authentication Protocol for Wireless Sensor Networks
  24. 1570129831 - Secure Sharing of Data in Cloud Computing
  25. 1570129885 - Heart Rate Variability for Biometric Authentication Using Time-Domain Features
  26. 1570129943 - Dual Stage Text Steganography Using Unicode Homoglyphs
  27. 1570129951 - Multilevel Threshold Secret Sharing in Distributed Cloud
  28. 1570130039 - Modeling Fuzzy Role Based Access Control Using Fuzzy Formal Concept Analysis
  29. 1570130043 - Malicious Circuit Detection for Improved Hardware Security
  30. 1570130051 - A Pareto Survivor Function Based Cluster Head Selection Mechanism (PSFCHSM) to Mitigate Selfish Nodes in Wireless Sensor Networks
  31. 1570130079 - Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Computing
  32. 1570130281 - An Optimal Authentication Protocol Using Certificateless ID-based Signature in MANET
  33. 1570132355 - A Coupled Chaos Based Image Encryption Scheme Using Bit Level Diffusion
  34. 1570132991 - A Secret Common Information Duality for Tripartite Noisy Correlations
  35. 1570133203 - A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images
  36. 1570138831 - A Robust and Secure DWT-SVD Digital Image Watermarking Using Encrypted Watermark for Copyright Protection of Cheque Image

Short Papers

  1. 1570114705 - A modus operandi for social networking security solutions based on varied usages
  2. 1570116655 - Adaptive and Secure Application Partitioning for Offloading in Mobile Cloud Computing
  3. 1570118065 - Technical Aspects of Cyber Kill Chain
  4. 1570126485 - FPGA Implementation of 128- bit Fused Multiply Add Unit for Crypto Processors
  5. 1570127467 - Securing database server using homomorphic encryption and re-encryption
  6. 1570127597 - Secure Communication using Digital Watermarking with Encrypted Text Hidden in an Image
  7. 1570127991 - A Low Overhead Prevention of Android WebView Abuse Attacks
  8. 1570129029 - Anomaly Detection through Comparison of Heterogeneous Machine Learning Classifiers Vs KPCA
  9. 1570129417 - A Novel Image Encryption Scheme Using an Irrevocable Multimodal Biometric Key
  10. 1570129961 - Secure and Privacy Preserving Biometric Authentication using Watermarking Technique
  11. 1570129983 - Reducing Vulnerability of a Fingerprint Authentication System
  12. 1570130425 - CLCT: Cross Language Cipher Technique
  13. 1570133201 - A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images