skip to content
Security in computing and communications : international symposium, SSCC 2013, Mysore, India, August 22-24, 2013 : proceedings Preview this item
ClosePreview this item
Checking...

Security in computing and communications : international symposium, SSCC 2013, Mysore, India, August 22-24, 2013 : proceedings

Author: Sabu M Thampi; Pradeep Atrey; Chun-I Fan; Gregorio Martinez Perez
Publisher: Heidelberg : Springer, [2013] ©2013
Series: Communications in computer and information science, 377.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Database:WorldCat
Summary:
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submissions. The papers cover all aspects of secure computing and communication in networking and distributed systems such as  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Congresses
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Sabu M Thampi; Pradeep Atrey; Chun-I Fan; Gregorio Martinez Perez
ISBN: 9783642405761 3642405762
OCLC Number: 858949405
Description: 1 online resource (xvi, 404 pages) : illustrations.
Contents: Regular Papers. A Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System / Sunil Malipatlolla --
Signature Embedding in the Functional Description of Reversible Circuit / Animesh Roy, Debasis Mitra --
Detecting Laser Fault Injection for Smart Cards Using Security Automata / Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet --
Virtual World Authentication Using the Smart Card Web Server / Lazaros Kyrillidis ... [et al.] --
A More Efficient and Secure Authentication Scheme over Insecure Networks Using Smart Cards / Chandra Sekhar Vorugunti, Mrudula Sarvabhatla --
A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value Decomposition / G. Jyothish Lal, V. K. Veena, K. P. Soman --
Random Key and Key Dependent S-box Generation for AES Cipher to Overcome Known Attacks / L. N. Pradeep, Aniruddha Bhattacharjya --
Emulating a High Interaction Honeypot to Monitor Intrusion Activity / Anil Gopalakrishna, Alwyn Rosham Pais --
On Pseudo-random Number Generation Using Elliptic Curve Cryptography / Manali Dubal, Aaradhana Deshmukh --
Exploiting Functional Models to Assess the Security Aspect in Embedded System Design / Ingo Stierand, Sunil Malipatlolla --
Design of CAPTCHA Script for Indian Regional Websites / M. Tariq Banday, Shafiya Afzal Sheikh --
A Survey of Traditional and Cloud Specific Security Issues / Sumitra Binu, Mohammed Misbahuddin --
A Chaos Based Method for Efficient Cryptographic S-box Design / Musheer Ahmad ... [et al.] --
A Multicast Authentication Protocol (MAP) for Dynamic Multicast Groups in Wireless Networks / Parag J. Jambhulkar ... [et al.] --
Clustering Based on Trust of a Node in Mobile Ad-Hoc NETworks / Pallavi Khatri, Shashikala Tapaswi, Udai P. Verma --
A Novel Approach for Monitoring SQL Anti-Forensic Attacks Using Pattern Matching for Digital Forensic Investigation / Vaibhav T. Patil, Amrita A. Manjrekar --
Robust BPSO and Scene Change Based Digital Video Watermarking Algorithm in DWT-DFT-SVD Domain / Rahim Ansari ... [et al.] --
Slide Attacks against Iterated Hill Ciphers / Liam Keliher, Samuel Thibodeau --
Efficient Hierarchical Key Management Scheme Based on Polynomial Construction / B. R. Purushothama, B. B. Amberker --
Hand Vein Authentication System Using Dynamic ROI / Munaga V. N. K. Prasad, Ilaiah Kavati, Kanavu Ravindra --
Vein Pattern Indexing Using Texture and Hierarchical Decomposition of Delaunay Triangulation / Ilaiah Kavati, Munaga V. N. K. Prasad, Chakravarthy Bhagvati --
Short Attribute-Based Group Signature without Random Oracles with Attribute Anonymity / Syed Taqi Ali, B. B. Amberker --
Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function / Ashok Kumar Das, Vanga Odelu, Adrijit Goswami --
Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks / Ashok Kumar Das, Santanu Chatterjee, Jamuna Kanta Sing --
Work-in-Progress. VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud / Sanchika Gupta, Padam Kumar --
Implementation and Embellishment of Prevention of Keylogger Spyware Attacks / Mohammad Wazid ... [et al.] --
Data Anonymization According to the Combination of Attributes on Social Network Sites / Sanaz Kavianpour, Bharanidharan Shanmugam, Zuraini Ismail --
Secure Multimedia Transmission in P2P Using Recurrence Relation and Evolutionary Algorithm / Ramesh Shahabadkar, Ramchandra V.Pujeri --
Hybrid Approach for Improvising Credit Card Fraud Detection Based on Collective Animal Behaviour and SVM / V. Dheepa, R. Dhanapal --
Recent Trends in Collection of Software Forensics Artifacts: Issues and Challenges / Deepak Gupta, Babu M. Mehtre --
Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net / Yosra Ben Mustapha, Hervé Debar --
Monitoring Information Leakage in a Web Browser / Nemisha Sharma ... [et al.] --
Securing Biometric Data with Visual Cryptography and Steganography / Deepak Aeloor, Amrita A. Manjrekar --
Forensics Analysis of Sandboxie Artifacts / Deepak Gupta, B. M. Mehte --
An Improved Secure Communication Scheme Using Adaptive Parameter Synchronization / Arti Dwivedi, Ashok K. Mittal, Suneet Dwivedi --
A Side View Based Video in Video Watermarking Using DWT and Hilbert Transform / Loganathan Agilandeeswari, K. Ganesan, K. Muralibabu --
Malware Detection Using API Function Frequency with Ensemble Based Classifier / Pratiksha Natani, Deepti Vidyarthi --
Privacy Issues in Single and Multi-hop Wireless Mesh Network / Sagar Kakade, Ravi Sawant, Deepak C. Karia --
Scalable Key Transport Protocol Using Chinese Remainder Theorem / Manisha Y. Joshi, R. S. Bichkar.
Series Title: Communications in computer and information science, 377.
Responsibility: Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez (eds.).
More information:

Abstract:

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submissions. The papers cover all aspects of secure computing and communication in networking and distributed systems such as cloud-based data centers.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/858949405>
library:oclcnum"858949405"
library:placeOfPublication
owl:sameAs<info:oclcnum/858949405>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:contributor
schema:contributor
schema:creator
schema:datePublished"2013"
schema:description"This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submissions. The papers cover all aspects of secure computing and communication in networking and distributed systems such as cloud-based data centers."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1414148280>
schema:genre"Electronic books."@en
schema:genre"Conference proceedings"@en
schema:inLanguage"en"
schema:name"Security in computing and communications : international symposium, SSCC 2013, Mysore, India, August 22-24, 2013 : proceedings"@en
schema:url
schema:url
schema:workExample
schema:workExample

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.