𝔖 Scriptorium
✦   LIBER   ✦

📁

Security in Computing and Communications: 5th International Symposium, SSCC 2017, Manipal, India, September 13–16, 2017, Proceedings

✍ Scribed by Sabu M. Thampi,Gregorio Martínez Pérez,Carlos Becker Westphall,Jiankun Hu,Chun I. Fan,Félix Gómez Mármol (eds.)


Publisher
Springer Singapore
Year
2017
Tongue
English
Leaves
441
Series
Communications in Computer and Information Science 746
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the refereed proceedings of the 5th International Symposium on Security in Computing and Communications, SSCC 2017, held in Manipal, India, in September 2017. The 21 revised full papers presented together with 13 short papers were carefully reviewed and selected from 84 submissions. The papers focus on topics such as cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security.

✦ Table of Contents


Front Matter ....Pages I-XIX
Diversity-aware, Cost-effective Network Security Hardening Using Attack Graph (M. A. Jabbar, Ghanshyam S. Bopche, B. L. Deekshatulu, B. M. Mehtre)....Pages 1-15
Fast Verification of Digital Signatures in IoT (Apurva S. Kittur, Ashu Jain, Alwyn Roshan Pais)....Pages 16-27
Efficient and Provably Secure Pairing Free ID-Based Directed Signature Scheme (N. B. Gayathri, R. R. V. Krishna Rao, P. Vasudeva Reddy)....Pages 28-38
User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition (Anup Kumar Maurya, V. N. Sastry)....Pages 39-53
Detection of Zeus Bot Based on Host and Network Activities (Ramesh Kalpika, A. R. Vasudevan)....Pages 54-64
An Asymmetric Key Based Efficient Authentication Mechanism for Proxy Mobile IPv6 Networks (Sandipan Biswas, Pampa Sadhukhan, Sarmistha Neogy)....Pages 65-78
User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem (Anup Kumar Maurya, V. N. Sastry)....Pages 79-94
A Ringer-Based Throttling Approach to Mitigate DDoS Attacks (Sarvesh V. Sawant, Gaurav Pareek, B. R. Purushothama)....Pages 95-108
NPSO Based Cost Optimization for Load Scheduling in Cloud Computing (Divya Chaudhary, Bijendra Kumar, Rahul Khanna)....Pages 109-121
Multi-sink En-Route Filtering Mechanism for Wireless Sensor Networks (Alok Kumar, Alwyn Roshan Pais)....Pages 122-133
Security Schemes for Constrained Application Protocol in IoT: A Precise Survey (Amit Mali, Anant Nimkar)....Pages 134-145
Jordan Center Segregation: Rumors in Social Media Networks (R. Krithika, Ashok Kumar Mohan, M. Sethumadhavan)....Pages 146-158
Honeyword with Salt-Chlorine Generator to Enhance Security of Cloud User Credentials (T. Nathezhtha, V. Vaidehi)....Pages 159-169
Multi Class Machine Learning Algorithms for Intrusion Detection - A Performance Study (Manjula C. Belavagi, Balachandra Muniyal)....Pages 170-178
Symmetric Key Based Secure Resource Sharing (Bruhadeshwar Bezawada, Kishore Kothapalli, Dugyala Raman, Rui Li)....Pages 179-194
Prevention of PAC File Based Attack Using DHCP Snooping (K. R. Atul, K. P. Jevitha)....Pages 195-204
A Quasigroup Based Synchronous Stream Cipher for Lightweight Applications (S. Lakshmi, Chungath Srinivasan, K. V. Lakshmy, M. Sindhu)....Pages 205-214
Security Analysis of Key Management Schemes Based on Chinese Remainder Theorem Under Strong Active Outsider Adversary Model (B. R. Purushothama, Arun Prakash Verma, Abhilash Kumar)....Pages 215-225
Deep Learning for Network Flow Analysis and Malware Classification (R. K. Rahul, T. Anjali, Vijay Krishna Menon, K. P. Soman)....Pages 226-235
Kernel Modification APT Attack Detection in Android (Ajay Anto, R. Srinivasa Rao, Alwyn Roshan Pais)....Pages 236-249
Opaque Predicate Detection by Static Analysis of Binary Executables (R. Krishna Ram Prakash, P. P. Amritha, M. Sethumadhavan)....Pages 250-258
An Overview on Spora Ransomware (Yassine Lemmou, El Mamoun Souidi)....Pages 259-275
Pattern Generation and Test Compression Using PRESTO Generator (Annu Roy, J. P. Anita)....Pages 276-285
Challenges in Android Forensics (Sudip Hazra, Prabhaker Mateti)....Pages 286-299
Current Consumption Analysis of AES and PRESENT Encryption Algorithms in FPGA Using the Welch Method (William P. Maia, Edward D. Moreno)....Pages 300-311
Spiral Model for Digital Forensics Investigation (Suvarna Kothari, Hitesh Hasija)....Pages 312-324
Smart-Lock Security Re-engineered Using Cryptography and Steganography (Chaitanya Bapat, Ganesh Baleri, Shivani Inamdar, Anant V. Nimkar)....Pages 325-336
Adding Continuous Proactive Forensics to Android (Karthik M. Rao, P. S. Aiyyappan, Prabhaker Mateti)....Pages 337-349
ASLR and ROP Attack Mitigations for ARM-Based Android Devices (Vivek Parikh, Prabhaker Mateti)....Pages 350-363
CBEAT: Chrome Browser Extension Analysis Tool (Sudakshina Singha Roy, K. P. Jevitha)....Pages 364-378
Hardware Trojan Detection Using Effective Test Patterns and Selective Segmentation (K. Atchuta Sashank, Hari Sivarami Reddy, P. Pavithran, M.S. Akash, M. Nirmala Devi)....Pages 379-386
Estimation and Tracking of a Ballistic Target Using Sequential Importance Sampling Method (J. Ramnarayan, J. P. Anita, P. Sudheesh)....Pages 387-398
An Android Application for Secret Image Sharing with Cloud Storage (K. Praveen, G. Indu, R. Santhya, M. Sethumadhavan)....Pages 399-410
Tracking of GPS Parameters Using Particle Filter (M. Nishanth, J.P. Anita, P. Sudheesh)....Pages 411-421
Back Matter ....Pages 423-424

✦ Subjects


Systems and Data Security


📜 SIMILAR VOLUMES


Security in Computing and Communications
✍ Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jos 📂 Library 📅 2016 🏛 Springer Singapore 🌐 English

<p>This book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016. The 23 revised full papers presented together with 16 short papers and an invited paper were carefully reviewed and s

Security in Computing and Communications
✍ Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi, Antonio Ruiz-Martínez (eds. 📂 Library 📅 2015 🏛 Springer International Publishing 🌐 English

<p>This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions.

Security in Computing and Communications
✍ Sunil Malipatlolla (auth.), Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregor 📂 Library 📅 2013 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p>This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submission

Security in Computing and Communications
✍ Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Cale 📂 Library 📅 2019 🏛 Springer Singapore 🌐 English

<p>This book constitutes the refereed proceedings of the 6th International Symposium on Security in Computing and Communications, SSCC 2018, held in Bangalore, India, in September 2018.<p></p><p>The 34 revised full papers and 12 revised short papers presented were carefully reviewed and selected fro

Security in Computing and Communications
✍ Sabu M. Thampi (editor), Gregorio Martinez Perez (editor), Ryan Ko (editor), Dan 📂 Library 📅 2020 🏛 Springer 🌐 English

<span>This book constitutes the refereed proceedings of the 7th International Symposium on Security in Computing and Communications, SSCC 2019, held in Trivandrum, India, in December 2019. </span><p></p><p><span>The 22 revised full papers and 7 revised short papers presented were carefully reviewed