Security in computing and communications : international symposium, SSCC 2013, Mysore, India, August 22-24, 2013 : proceedings /

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submissions....

Full description

Saved in:
Bibliographic Details
Corporate Authors: SSCC (Conference) Mysore, India); SpringerLink (Online service)
Group Author: Thampi, Sabu M.; Atrey, Pradeep; Fan, Chun-I.; Perez, Gregorio Martinez
Published: Springer,
Publisher Address: Heidelberg :
Publication Dates: [2013]
Literature type: eBook
Language: English
Series: Communications in computer and information science, 377
Subjects:
Online Access: http://dx.doi.org/10.1007/978-3-642-40576-1
Summary: This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submissions. The papers cover all aspects of secure computing and communication in networking and distributed systems such as cloud-based data centers.
Carrier Form: 1 online resource (xvi, 404 pages) : illustrations.
Bibliography: Includes bibliographical references and index.
ISBN: 9783642405761 (electronic bk.)
3642405762 (electronic bk.)
Index Number: TK5105
CLC: TP393.08-532
Contents: Regular Papers.
A Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System /
Signature Embedding in the Functional Description of Reversible Circuit /
Detecting Laser Fault Injection for Smart Cards Using Security Automata /
Virtual World Authentication Using the Smart Card Web Server /
A More Efficient and Secure Authentication Scheme over Insecure Networks Using Smart Cards /
A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value Decomposition /
Random Key and Key Dependent S-box Generation for AES Cipher to Overcome Known Attacks /
Emulating a High Interaction Honeypot to Monitor Intrusion Activity /
On Pseudo-random Number Generation Using Elliptic Curve Cryptography /
Exploiting Functional Models to Assess the Security Aspect in Embedded System Design /
Design of CAPTCHA Script for Indian Regional Websites /
A Survey of Traditional and Cloud Specific Security Issues /
A Chaos Based Method for Efficient Cryptographic S-box Design /
A Multicast Authentication Protocol (MAP) for Dynamic Multicast Groups in Wireless Networks /
Clustering Based on Trust of a Node in Mobile Ad-Hoc NETworks /
A Novel Approach for Monitoring SQL Anti-Forensic Attacks Using Pattern Matching for Digital Forensic Investigation /
Robust BPSO and Scene Change Based Digital Video Watermarking Algorithm in DWT-DFT-SVD Domain /
Slide Attacks against Iterated Hill Ciphers /
Efficient Hierarchical Key Management Scheme Based on Polynomial Construction /
Hand Vein Authentication System Using Dynamic ROI /
Vein Pattern Indexing Using Texture and Hierarchical Decomposition of Delaunay Triangulation /
Short Attribute-Based Group Signature without Random Oracles with Attribute Anonymity /
Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function /
Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks /
Work-in-Progress.
VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud /
Implementation and Embellishment of Prevention of Keylogger Spyware Attacks /
Data Anonymization According to the Combination of Attributes on Social Network Sites /
Secure Multimedia Transmission in P2P Using Recurrence Relation and Evolutionary Algorithm /
Hybrid Approach for Improvising Credit Card Fraud Detection Based on Collective Animal Behaviour and SVM /
Recent Trends in Collection of Software Forensics Artifacts: Issues and Challenges /
Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri Net /
Monitoring Information Leakage in a Web Browser /
Securing Biometric Data with Visual Cryptography and Steganography /
Forensics Analysis of Sandboxie Artifacts /
An Improved Secure Communication Scheme Using Adaptive Parameter Synchronization /
A Side View Based Video in Video Watermarking Using DWT and Hilbert Transform /
Malware Detection Using API Function Frequency with Ensemble Based Classifier /
Privacy Issues in Single and Multi-hop Wireless Mesh Network /
Scalable Key Transport Protocol Using Chinese Remainder Theorem /