Abstract is missing.
- An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like MechanismsKristof Teichel, Dieter Sibold, Stefan Milius. 3-22 [doi]
- Practical DoS Attacks on Embedded Networks in Commercial VehiclesSubhojeet Mukherjee, Hossein Shirazi, Indrakshi Ray, Jeremy Daily, Rose F. Gamble. 23-42 [doi]
- Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things EnvironmentSrinivas Jangirala, Dheerendra Mishra, Sourav Mukhopadhyay. 45-65 [doi]
- SPOSS: Secure Pin-Based-Authentication Obviating Shoulder SurfingAnkit Maheshwari, Samrat Mondal. 66-86 [doi]
- Building a Fair System Using Access RightsNada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia. 89-108 [doi]
- Collaborative Access Decisions: Why Has My Decision Not Been Enforced?Jerry den Hartog, Nicola Zannone. 109-130 [doi]
- Data Loss Prevention Based on Text Classification in Controlled EnvironmentsKyrre Wahl Kongsgård, Nils Agne Nordbotten, Federico Mancini, Paal E. Engelstad. 131-150 [doi]
- Defining Abstract Semantics for Static Dependence Analysis of Relational Database ApplicationsAngshuman Jana, Raju Halder. 151-171 [doi]
- An Efficient Certificateless Signature Scheme in the Standard ModelSébastien Canard, Viet Cuong Trinh. 175-192 [doi]
- Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast EncryptionSébastien Canard, Viet Cuong Trinh. 193-211 [doi]
- Enhanced Modulo Based Multi Secret Image Sharing SchemeMaroti Deshmukh, Neeta Nain, Mushtaq Ahmed. 212-224 [doi]
- Performance Evaluation of Modified Henon Map in Image EncryptionS. J. Sheela, K. V. Suresh, Deepaknath Tandur. 225-240 [doi]
- Network Counter-Attack Strategy by Topology Map AnalysisHidema Tanaka. 243-262 [doi]
- Network Vulnerability Analysis Using a Constrained Graph Data ModelMridul Sankar Barik, Chandan Mazumdar, Amarnath Gupta. 263-282 [doi]
- Secured Dynamic Scheduling Algorithm for Real-Time Applications on GridSurendra Singh, Sachin Tripathi, Suvadip Batabyal. 283-300 [doi]
- A Framework for Analyzing Associativity and Anonymity in Conventional and Electronic Summative ExaminationsKissan G. Gauns Dessai, Venkatesh V. Kamat. 303-323 [doi]
- On the Security of "Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems"Hardik Gajera, Shruti Naik, Manik Lal Das. 324-335 [doi]
- Privacy Preserving Network Analysis of Distributed Social NetworksVarsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar. 336-355 [doi]
- Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud DataSanat Ghoshal, Goutam Paul. 359-371 [doi]
- Risk Evaluation of X.509 Certificates - A Machine Learning ApplicationVarsharani Hawanna, Vrushali Kulkarni, Rashmi Rane, Pooja Joshi. 372-389 [doi]
- A Secure Routing Scheme for Wireless Mesh NetworksAshish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni. 393-408 [doi]
- Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid ApproachesVenkata Udaya Sameer, S. Sugumaran, Ruchira Naskar. 409-425 [doi]
- Formal Verification of a Cross-Layer, Trustful Space-Time Protocol for Wireless Sensor NetworksDouglas Simões Silva, Davi Resner, Rick Lopes de Souza, Jean Everson Martina. 426-443 [doi]
- JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANETSudhir Bagade, Vijay Raisinghani. 444-458 [doi]
- A Solution to Detect Phishing in Android DevicesSharvari Prakash Chorghe, Narendra Shekokar. 461-470 [doi]
- Feature Selection for Effective Botnet Detection Based on Periodicity of TrafficT. Harsha, S. Asha, B. Soniya. 471-478 [doi]
- Honeypot Deployment in Broadband NetworksSaurabh Chamotra, Rakesh Kumar Sehgal, Sanjeev Ror, Bhupendra Singh. 479-488 [doi]
- Generic Construction of Certificateless Signcryption SchemeJayaprakash Kar, Kshirasagar Naik. 489-498 [doi]
- Reed-Muller Code Based Symmetric Key Fully Homomorphic Encryption SchemeRatnaKumari Challa, VijayaKumari Gunta. 499-508 [doi]
- Towards Useful Anomaly Detection for Back Office NetworksÖmer Yüksel, Jerry den Hartog, Sandro Etalle. 509-520 [doi]
- Detection of SQLite Database Vulnerabilities in Android AppsVineeta Jain, Manoj Singh Gaur, Vijay Laxmi, Mohamed Mosbah. 521-531 [doi]
- Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based ApproachLokesh Jain, Aditya Chandran, Sanjay Rawat, Kannan Srinathan. 532-542 [doi]