1 | -- | 14 | Sarvesh Tanwar, Anil Kumar. A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority |
15 | -- | 28 | Anjali Kumawat, Anil Kumar Sharma, Sunita Kumawat. Identification of Cryptographic Vulnerability and Malware Detection in Android |
29 | -- | 41 | Deepti Vidyarthi, S. P. Choudhary, Subrata Rakshit, C. R. S. Kumar. Malware Detection by Static Checking and Dynamic Analysis of Executables |
42 | -- | 53 | Sunil Kumar Singh, Prabhat Kumar, Jyoti Prakash Singh. Localization in Wireless Sensor Networks Using Soft Computing Approach |
54 | -- | 62 | Daya Sagar Gupta, G. P. Biswas. A Secure Cloud Storage using ECC-Based Homomorphic Encryption |
63 | -- | 74 | Saurabh Chamotra, Rakesh Kumar Sehgal, Ram Swaroop Misra. Honeypot Baselining for Zero Day Attack Detection |