Accepted Papers & Statistics
LIST OF REGISTERED PAPERS as on August 17, 2012
Paper-ID |
Paper Title |
ID-based Threshold Signcryption and Group Unsigncryption |
|
Protocol for Secure Submissions Into Learning Management Systems |
|
Secure Leader Election Algorithm Optimized for Power Saving Using
Mobile Agents for Intrusion Detection in MANET |
|
WAKE: Authentication and Key Establishment for Wireless Mesh Network |
|
Effective Implementation of DES Algorithm for Voice Scrambling |
|
Towards Constructing a Trustworthy Internet: Privacy-aware Transfer
of Digital Identity Document in Content Centric Internetworking |
|
Security Analysis of CAPTCHA |
|
A new approach towards segmentation for breaking CAPTCHA |
|
Imperceptible Image Indexing Using Digital Watermarking |
|
A Novel Key Management Mechanism for Dynamic Hierarchical Access
Control Based on Linear Polynomials |
|
A New Deterministic Algorithm for Testing Primality
Based on a New Property of Prime Numbers |
|
Implementation of MD6 |
|
Neural Synchronization by Mutual Learning Using Genetic Approach for
Secure Key Generation |
|
Publicly Auditable Provable Data Possession Scheme for Outsourced
Data in the Public Cloud Using Polynomial Interpolation |
|
Location estimation of mobile in GSM and CDMA networks |
|
Multilingual Speaker Identification with the Constraint of Limited
Data Using Multitaper MFCC |
|
Secure Group Key Management Scheme for Simultaneous Multiple Groups
with Overlapped Memberships Using Binomial Key Tree |
|
An Analytical Approach to Position-Based Routing Protocol for
Vehicular Ad Hoc Networks |
|
Simulation and Evaluation of Different Mobility Models Using DSR Protocol
Ad-hoc Sensor Network Using Bonnmotion Tool |
|
Secure Authentication in Multimodal Biometric Systems Using
Cryptographic Hash Functions |
|
Data Protection and Privacy Preservation Using Searchable Encryption
on Outsourced Databases |
|
A Dynamic Syntax Interpretation for Java Based Smart Card to
Mitigate Logical Attacks |
|
Taxonomy of Slow DoS Attacks to Web
Applications |
|
An Adaptive Distributed Intrusion Detection System for Cloud
Computing Framework |
|
Crypto-Precision:Testing Tool for Hash Function |
|
Performance Analysis and Improvement Using LFSR in the Pipelined Key
Scheduling Section of DES |
|
Towards Retrieving Live Forensic Artifacts in Offline Forensics |
|
Carving of Bitmap Files From Digital Evidences by Contiguous File
Filtering |
|
Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks |
|
Intrusion Protection Against SQL Injection and Cross Site Scripting
Attacks Using a Reverse Proxy |
|
Three-way Handshake-Based OTP Using Random Host-Side Keys for
Effective Key Transfer in Symmetric Cryptosystems |
|
Biologically Inspired Computer Security System: The Way Ahead |
|
Identity Based Privacy Preserving Dynamic Broadcast Encryption for
Multi-privileged Groups |
|
A Virtualization-Level Future Internet Defense-in-Depth Architecture |
|
eCloudIDS Tier-1 uX-Engine Subsystem Design and Implementation using Self-Organizing Map (SOM) for Secure Cloud Computing Environment |
|
Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion
Detection |
|
Experimental DRM Model Using Mobile Code and White-Box Encryption |
|
Towards a Secure, Transparent and Privacy-Preserving DRM System |
|
Stationary Wavelet Transformation Based Self-Recovery of
Blind-Watermark from Electrocardiogram Signal in Wireless Telecardiology |
|
A Comparative Study on Wormhole Attack Prevention Schemes in Mobile
Ad-Hoc Network |
|
A Comparative Analysis of the Ant based Systems for QoS Routing in MANET |
|
A Survey of Blackhole Attacks and
Countermeasures in Wireless Mobile Ad-hoc Networks |
|
eCloudIDS - Design Roadmap for
the Architecture of Next-generation Hybrid Two-tier Expert Engine-based IDS
for Cloud Computing Environment |
|
iReSign - Implementation of
Next-generation Two-tier Identity Classifier-based Traffic Sign Recognition
System Architecture using Hybrid Region-based Shape Representation Techniques |
|
Management of Routed Wireless M-Bus Networks for Sparsely Populated
Large-Scale Smart-Metering Installations |
|
1569635553 |
Time Based Constrained Object Identification in a Dynamic Social
Network |
1569634749 |
Efficient Weighted innovative Routing Protocol (EWiRP) to Balance Load in Mobile Ad Hoc Networks (MANETs): Simulation and Feasibility Analysis |