Accepted Papers & Statistics

 

LIST OF REGISTERED PAPERS as on August 17, 2012

Paper-ID

Paper Title

1569618209

ID-based Threshold Signcryption and Group Unsigncryption

1569620313

Protocol for Secure Submissions Into Learning Management Systems

1569622031

Secure Leader Election Algorithm Optimized for Power Saving Using Mobile Agents for Intrusion Detection in MANET

1569622295

WAKE: Authentication and Key Establishment for Wireless Mesh Network

1569623505

Effective Implementation of DES Algorithm for Voice Scrambling

1569623635

Towards Constructing a Trustworthy Internet: Privacy-aware Transfer of Digital Identity Document in Content Centric Internetworking

1569630515

Security Analysis of CAPTCHA

1569630883

A new approach towards segmentation for breaking CAPTCHA

1569632673

Imperceptible Image Indexing Using Digital Watermarking

1569634087

A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials

1569634115

A New Deterministic Algorithm for Testing Primality Based on a New Property of Prime Numbers

1569634323

Implementation of MD6

1569634489

Neural Synchronization by Mutual Learning Using Genetic Approach for Secure Key Generation

1569634513

Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation

1569634519

Location estimation of mobile in GSM and CDMA networks

1569634581

Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCC

1569634585

Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree

1569634737

An Analytical Approach to Position-Based Routing Protocol for Vehicular Ad Hoc Networks

1569634831

Simulation and Evaluation of Different Mobility Models Using DSR Protocol Ad-hoc Sensor Network Using Bonnmotion Tool

1569634839

Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions

1569634869

Data Protection and Privacy Preservation Using Searchable Encryption on Outsourced Databases

1569635275

A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks

1569635313

Taxonomy of Slow DoS Attacks to Web Applications

1569635391

An Adaptive Distributed Intrusion Detection System for Cloud Computing Framework

1569635447

Crypto-Precision:Testing Tool for Hash Function

1569635459

Performance Analysis and Improvement Using LFSR in the Pipelined Key Scheduling Section of DES

1569635473

Towards Retrieving Live Forensic Artifacts in Offline Forensics

1569635477

Carving of Bitmap Files From Digital Evidences by Contiguous File Filtering

1569635505

Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks

1569635513

Intrusion Protection Against SQL Injection and Cross Site Scripting Attacks Using a Reverse Proxy

1569635529

Three-way Handshake-Based OTP Using Random Host-Side Keys for Effective Key Transfer in Symmetric Cryptosystems

1569635615

Biologically Inspired Computer Security System: The Way Ahead

1569635631

Identity Based Privacy Preserving Dynamic Broadcast Encryption for Multi-privileged Groups

1569635633

A Virtualization-Level Future Internet Defense-in-Depth Architecture

1569635653

eCloudIDS Tier-1 uX-Engine Subsystem Design and Implementation using Self-Organizing Map (SOM) for Secure Cloud Computing Environment

1569635655

Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection

1569635693

Experimental DRM Model Using Mobile Code and White-Box Encryption

1569635821

Towards a Secure, Transparent and Privacy-Preserving DRM System

1569636965

Stationary Wavelet Transformation Based Self-Recovery of Blind-Watermark from Electrocardiogram Signal in Wireless Telecardiology

1569640137

A Comparative Study on Wormhole Attack Prevention Schemes in Mobile Ad-Hoc Network

1569640149

A Comparative Analysis of the Ant based Systems for QoS Routing in MANET

1569642197

A Survey of Blackhole Attacks and Countermeasures in Wireless Mobile Ad-hoc Networks

1569642553

eCloudIDS - Design Roadmap for the Architecture of Next-generation Hybrid Two-tier Expert Engine-based IDS for Cloud Computing Environment

1569642559

iReSign - Implementation of Next-generation Two-tier Identity Classifier-based Traffic Sign Recognition System Architecture using Hybrid Region-based Shape Representation Techniques

1569653803

Management of Routed Wireless M-Bus Networks for Sparsely Populated Large-Scale Smart-Metering Installations

1569635553

Time Based Constrained Object Identification in a Dynamic Social Network

1569634749

Efficient Weighted innovative Routing Protocol (EWiRP) to Balance Load in Mobile Ad Hoc Networks (MANETs): Simulation and Feasibility Analysis