𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings

✍ Scribed by Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi, Antonio Ruiz-Martínez (eds.)


Publisher
Springer International Publishing
Year
2015
Tongue
English
Leaves
561
Series
Communications in Computer and Information Science 536
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.

✦ Table of Contents


Front Matter....Pages I-XXI
Front Matter....Pages 1-1
A Dynamic Multi-domain Access Control Model in Cloud Computing....Pages 3-12
Multilevel Threshold Secret Sharing in Distributed Cloud....Pages 13-23
Secure Sharing of Data in Cloud Computing....Pages 24-35
Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud ....Pages 36-44
Adaptive and Secure Application Partitioning for Offloading in Mobile Cloud Computing....Pages 45-53
Intelligent Intrusion Detection System for Private Cloud Environment....Pages 54-65
Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Computing....Pages 66-77
FPGA Implementation of 128-Bit Fused Multiply Add Unit for Crypto Processors....Pages 78-85
Front Matter....Pages 87-87
A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images....Pages 89-98
Anonymizing Classification Data for Preserving Privacy....Pages 99-109
An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET....Pages 110-121
Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme....Pages 122-133
Cryptanalysis and Improvement of ECC - Based Security Enhanced User Authentication Protocol for Wireless Sensor Networks....Pages 134-145
Secure and Privacy Preserving Biometric Authentication Using Watermarking Technique....Pages 146-156
Reducing Vulnerability of a Fingerprint Authentication System....Pages 157-167
Heart Rate Variability for Biometric Authentication Using Time-Domain Features....Pages 168-175
Modeling Fuzzy Role Based Access Control Using Fuzzy Formal Concept Analysis....Pages 176-185
An Efficient Fingerprint Minutiae Detection Algorithm....Pages 186-194
Front Matter....Pages 195-195
Analysis of Neural Synchronization Using Genetic Approach for Secure Key Generation....Pages 197-206
Front Matter....Pages 207-216
CLCT: Cross Language Cipher Technique....Pages 195-195
A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images....Pages 217-227
A Coupled Chaos Based Image Encryption Scheme Using Bit Level Diffusion....Pages 228-237
Secure Communication Using Digital Watermarking with Encrypted Text Hidden in an Image....Pages 238-246
A Novel Image Encryption Scheme Using an Irrevocable Multimodal Biometric Key....Pages 247-255
Dual Stage Text Steganography Using Unicode Homoglyphs....Pages 256-264
Securing Database Server Using Homomorphic Encryption and Re-encryption....Pages 265-276
A Robust and Secure DWT-SVD Digital Image Watermarking Using Encrypted Watermark for Copyright Protection of Cheque Image....Pages 277-289
Front Matter....Pages 290-303
Occlusion Detection Based on Fractal Texture Analysis in Surveillance Videos Using Tree-Based Classifiers....Pages 305-305
A Modus Operandi for Social Networking Security Solutions Based on Varied Usages....Pages 307-316
A Secret Common Information Duality for Tripartite Noisy Correlations....Pages 317-328
Exploiting Domination in Attack Graph for Enterprise Network Hardening....Pages 329-341
Modeling Dependencies of ISO/IEC 27002:2013 Security Controls....Pages 342-353
Secure Cluster Based Routing Scheme (SCBRS) for Wireless Sensor Networks....Pages 354-367
A Pareto Survivor Function Based Cluster Head Selection Mechanism (PSFCHSM) to Mitigate Selfish Nodes in Wireless Sensor Networks....Pages 368-380
Vehicle Brake and Indicator Detection for Autonomous Vehicles....Pages 381-391
Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks....Pages 392-401
Human Activity Recognition Based on Motion Projection Profile Features in Surveillance Videos Using Support Vector Machines and Gaussian Mixture Models....Pages 402-411
Analysis of Accountability Property in Payment Systems Using Strand Space Model....Pages 412-423
Technical Aspects of Cyber Kill Chain....Pages 424-437
Front Matter....Pages 438-452
Detection and Mitigation of Android Malware Through Hybrid Approach....Pages 453-453
Malicious Circuit Detection for Improved Hardware Security....Pages 455-463
Framework for Live Forensics of a System by Extraction of Clipboard Data and Other Forensic Artefacts from RAM Image....Pages 464-472
Anomaly Detection Through Comparison of Heterogeneous Machine Learning Classifiers vs KPCA....Pages 473-482
Android Users Security via Permission Based Analysis....Pages 483-495
Data-Centric Refinement of Information Flow Analysis of Database Applications....Pages 496-505
Detection and Diagnosis of Hardware Trojan Using Power Analysis....Pages 506-518
A Low Overhead Prevention of Android WebView Abuse Attacks....Pages 519-529
An Automata Based Approach for the Prevention of NoSQL Injections....Pages 530-537
Back Matter....Pages 538-546
....Pages 547-548

✦ Subjects


Systems and Data Security; Computer Communication Networks; e-Commerce/e-business


πŸ“œ SIMILAR VOLUMES


Security in Computing and Communications
✍ Sunil Malipatlolla (auth.), Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregor πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submission

Security in Computing and Communications
✍ Sabu M. Thampi,Gregorio MartΓ­nez PΓ©rez,Carlos Becker Westphall,Jiankun Hu,Chun I πŸ“‚ Library πŸ“… 2017 πŸ› Springer Singapore 🌐 English

<p>This book constitutes the refereed proceedings of the 5th International Symposium on Security in Computing and Communications, SSCC 2017, held in Manipal, India, in September 2017. The 21 revised full papers presented together with 13 short papers were carefully reviewed and selected from 84 subm

Security in Computing and Communications
✍ Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jos πŸ“‚ Library πŸ“… 2016 πŸ› Springer Singapore 🌐 English

<p>This book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016. The 23 revised full papers presented together with 16 short papers and an invited paper were carefully reviewed and s

Eco-friendly Computing and Communication
✍ Mahalingam P.R., Shimmi Asokan (auth.), Jimson Mathew, Priyadarshan Patra, Dhira πŸ“‚ Library πŸ“… 2012 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This book constitutes the refereed proceedings of the International Conference Eco-friendly Computing and Communication Systems, ICECCS 2012, held in Kochi, Kerala, India, in August 2012. The 50 revised full papers presented were carefully reviewed and selected from 133 submissions. The papers ar

Security in Computing and Communications
✍ Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Cale πŸ“‚ Library πŸ“… 2019 πŸ› Springer Singapore 🌐 English

<p>This book constitutes the refereed proceedings of the 6th International Symposium on Security in Computing and Communications, SSCC 2018, held in Bangalore, India, in September 2018.<p></p><p>The 34 revised full papers and 12 revised short papers presented were carefully reviewed and selected fro