Автор: Sabu M. Thampi, Gregorio Mart?nez P?rez, Carlos Becker Westphall Название: Security in Computing and Communications: 5th International Symposium, SSCC 2017, Manipal, India, September 13–16, 2017, Proceedings Издательство: Springer Год: 2017 ISBN: 9789811068973 Серия: Communications in Computer and Information Science (Book 746) Язык: English Формат: pdf Размер: 43,3 mb Страниц: 424
The 21 revised full papers presented together with 13 short papers were carefully reviewed and selected from 84 submissions. The papers focus on topics such as cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security.
Diversity-aware. Cost-effective Network Security Hardening Using Attack Graph M.A. Jabbar, Ghanshyam S. Bopche, B.L Deekshasulu, and B.M. Mehtre
Fast Verification of Digital Signatures in loT Apurva S. Kittur, Ashu Jain, and AJwyn Roshan Pais
Efficient and Provably Secure Pairing Free ID-Based Directed Signature Scheme N.B. Gayathri, R.R.V. Krishna Rao, and P. Vasudeva Reddy
User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition Anup Kumar Maurya and V.N. Sastry
Detection of Zeus Bot Based on Host and Network Activities Ramesh Kalpika and A.R. Vasudevan
An Asymmetric Key Based Efficient Authentication Mechanism for Proxy Mobile IPv6 Networks Sandipan Biswas, Pampa Sadhukhan, and Sarmistha Neogy
User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem Anup Kumar Maurya and V.N. Sastry
A Ringer-Based Throttling Approach to Mitigate DDoS Attacks Sarvesh V. Sawant, Gaurav Pareek, and B.R. Purushothama
NPSO Based Cost Optimization for Load Scheduling in Cloud Computing Divya Chaudhary, Bijendra Kumar, and Rahul Khanna
Multi-sink En-Route Filtering Mechanism for Wireless Sensor Networks Alok Kumar and Alwyn Roshan Pais
Security Schemes for Constrained Application Protocol in IoT: A Precise Survey Amit Mali and Anant Nimkar
Jordan Center Segregation: Rumors in Social Media Networks R. Krithika, Ashok Kumar Mohan, and M. Sethumadhavan
Honeyword with Salt-Chlorine Generator to Enhance Security of Cloud User Credentials T. Nathezhtha and V. Vaidehi
Multi Class Machine Learning Algorithms for Intrusion Detection - A Performance Study Manjula C. Belavagi and Balachandra Muniyal
Symmetric Key Based Secure Resource Sharing Bruhadeshwar Bezawada, Kishore Kothapalli, Dugyala Raman, and Rui Li
Prevention of РАС File Based Attack Using DHCP Snooping K.R. Atul and K.P. Jevitha
A Quasigroup Based Synchronous Stream Cipher for Lightweight Applications S. Lakshmi, Chungath Srinivasan, K.V. Lakshmy, and M. Sindhu
Security Analysis of Key Management Schemes Based on Chinese Remainder Theorem Under Strong Active Outsider Adversary Model B.R. Purushothama, Arun Prakash Verma, and Abhilash Kumar
Deep learning for Network Row Analysis and Malware Classification R.K. Rahul, T. Anjali, Vijay Krishna Menon, and K.P. Soman
Kernel Modification APT Attack Detection in Android Ajay Anto, R. Srinivasa Rao, and Alwyn Roshan Pais
Opaque Predicate Detection by Static Analysis of Binary Executables R. Krishna Ram Prakash, P.P. Amritha, and M. Sethumadhavan
An Overview on Spora Ransomware Yassine Lemmou and El Mamoun Souidi
Pattern Generation and Test Compression Using PRESTO Generator Annu Roy and J.P. Anita
Challenges in Android Forensics Sudip Hazra and Prabhaker Mateti
Current Consumption Analysis of AES and PRESENT Encryption Algorithms in FPGA Using the Welch Method William P. Maia and Edward D. Moreno
Spiral Model for Digital Forensics Investigation Suvarna Kothari and Hitesh Hasija
Smart-Lock Security Re-engineered Using Cryptography and Steganography Chaitanya Bapat, Ganesh Baleri, Shivani Inamdar, and Anant V. Nimkar
Adding Continuous Proactive Forensics to Android Karthik M. Rao, P.S. Aiyyappan, and Prabhaker Mateti
ASLR and ROP Attack Mitigations for ARM-Based Android Devices Vivek Parikh and Prabhaker Mateti
CBEAT: Chrome Browser Extension Analysis Tool Sudakshina Singha Roy and K.P. Jexitha
Hardware Trojan Detection Using Effective Test Patterns and Selective Segmentation K. Atchuta Sashank, Hari Sivarami Reddy, P. Pavithran, M.S. Akash, and M. Nirmala Devi
Estimation and Tracking of a Ballistic Target Using Sequential Importance Sampling Method J. Ramnarayan, J.P. Anita, and P. Sudheesh
An Android Application for Secret Image Sharing with Cloud Storage K. Praveen, G. Indu, R. Santhya, and M. Sethumadhavan
Tracking of GPS Parameters Using Particle Filter M. Nishanth, J.P. Anita, and P. Sudheesh Author Index
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.