Abstract is missing.
- Keynote address: Quo Vadis PKI?C. E. Veni Madhavan. 8 [doi]
- Evolution of PKI ecosystemBalaji Rajendran. 9-10 [doi]
- Lightning talks session 1: Trust management in PKIPriyadarshi Singh. 13-15 [doi]
- Tutorials: Lattice based cryptgraphyRishiraj Bhattacharyya. 16 [doi]
- An enhanced secure authentication scheme with user anonymity in mobile cloud computingR. Madhusudhan, K. S. Suvidha. 17-22 [doi]
- Malsign: Threat analysis of signed and implicitly trusted malicious codeSoumajit Pal, Prabaharan Poornachandran, Manu R. Krishnan, A. U. Prem Sankar, Parvathy Sasikala. 23-27 [doi]
- An online signature method using DNA based bio-hash for positive identification and non-repudiationC. S. Sreeja, Mohammed Misbahuddin. 28-35 [doi]
- XML wrapping attack mitigation using positional tokenJitendra Kumar, Balaji Rajendran, B. S. Bindhumadhava, N. Sarat Chandra Babu. 36-42 [doi]
- A study on remote data integrity checking techniques in cloudC. Sasikala, C. Shoba Bindu. 43-48 [doi]
- Secure access of multiple keywords over encrypted data in cloud environment using ECC-PKI and ECC ElGamalSourabh Prakash, Nitish Andola, S. Venkatesan 0002. 49-56 [doi]
- Design and implementation of IP core for RoadRunneR-128 block cipherMitha Raj, K. Shinta Joseph, Josemon Tomy, K. S. Niveditha, Anna Johnson, R. Nandakumar, Mitu Raj. 57-62 [doi]
- Digital token based remote administrationAnoop Kumar Pandey, Balaji Rajendran, B. S. Bindhumadhava. 63-66 [doi]